source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Reactances%20of%20synchronous%20machines | The reactances of synchronous machines comprise a set of characteristic constants used in the theory of synchronous machines. Technically, these constants are specified in units of the electrical reactance (ohms), although they are typically expressed in the per-unit system and thus dimensionless. Since for practically all (except for the tiniest) machines the resistance of the coils is negligibly small in comparison to the reactance, the latter can be used instead of (complex) electrical impedance, simplifying the calculations.
Two reactions theory
The air gap of the machines with a salient pole rotor is quite different along the pole axis (so called direct axis) and in the orthogonal direction (so called quadrature axis). Andre Blondel in 1899 proposed in his paper "Empirical Theory of Synchronous Generators" the two reactions theory that divided the armature magnetomotive force (MMF) into two components: the direct axis component and the quadrature axis component. The direct axis component is aligned with the magnetic axis of the rotor, while the quadrature (or transverse) axis component is perpendicular to the direct axis. The relative strengths of these two components depend on the design of the machine and the operating conditions. Since the equations naturally split into direct and quadrature components, many reactances come in pairs, one for the direct axis (with the index d), one for the quadrature axis (with the index q). In the machines with a cylindrical rotor the air gap is uniform, the reactances along the d and q axes are equal, and d/q indices are frequently dropped.
States of the generator
The flux linkages of the generator vary with its state. Three states are considered:
the steady-state is the normal operating condition with the armature magnetic flux going through the rotor;
the sub-transient state is the one the generator enters immediately after the fault (short circuit). In this state the armature flux is pushed completely out of the r |
https://en.wikipedia.org/wiki/Domain-specific%20architecture | A domain-specific architecture (DSA) is a programmable computer architecture specifically tailored to operate very efficiently within the confines of a given application domain. The term is often used in contrast to general-purpose architectures, such as CPUs, that are designed to operate on any computer program.
History
In conjunction with the semiconductor boom that started in the 1960s, computer architects were tasked with finding new ways to exploit the increasingly large number of transistors available. Moore's Law and Dennard Scaling enabled architects to focus on improving the performance of general-purpose microprocessors on general-purpose programs.
These efforts yielded several technological innovations, such as multi-level caches, out-of-order execution, deep instruction pipelines, multithreading, and multiprocessing. The impact of these innovations was measured on generalist benchmarks such as SPEC, and architects were not concerned with the internal structure or specific characteristics of these programs.
The end of Dennard Scaling pushed computer architects to switch from a single, very fast processor to several processor cores. Performance improvement could no longer be achieved by simply increasing the operating frequency of a single core.
The end of Moore's Law shifted the focus away from general-purpose architectures towards more specialized hardware. Although general-purpose CPU will likely have a place in any computer system, heterogeneous systems composed of general-purpose and domain-specific components are the most recent trend for achieving high performance.
While hardware accelerators and ASIC have been used in very specialized application domains since the inception of the semiconductor industry, they generally implement a specific function with very limited flexibility. In contrast, the shift towards domain-specific architectures wants to achieve a better balance of flexibility and specialization.
A notable early example of a dom |
https://en.wikipedia.org/wiki/T-MOS%20thermal%20sensor | TMOS is a new type of thermal sensor consisting in a micromachined thermally isolated transistor fabricated using CMOS-SOI(Silicon on Insulator) MEMS(Micro electro-mechanical system) technology. It has been developed in the last decade by the Technion - Israel Institute of Technology. A thermal sensor is a device able to detect the thermal radiation emitted by an object located in the FOV(Field Of View) of the sensor. Infrared radiation ( IR ) striking the sensor produces a change in the temperature of the device that as a consequence generates an electric output signal proportional to the incident IR power. The sensor is able to measure the temperature of the object radiating thanks to the information contained in the impinging radiation, exploiting in this sense Stefan - Boltzmann law. TMOS detector has two important characteristics that make it different from others: it's an active and uncooled sensor.
Fabrication process
A TMOS detector consists in a mosaic structure composed of several sub-pixels, which are electrically connected in parallel or in series or in a mixed combination, and are thermally isolated. In each sub-pixels the sensitive element is the TMOS sensor, that is suspended in vacuum, fabricated in CMOS - SOI technology and dry released. The mosaic structure includes: the pixel frame, the suspended transistor, that absorbs IR radiation and that could also be embedded in an absorbing IR membrane which determine the thermal capacitance of the sensor, and two folding arms that determine the sensor thermal conductance.
TMOS fabrication is based on built - in masks and dry bulk micromachining. In TMOS fabrication to the standard CMOS - SOI technology, used to produce MOS transistor, is added a MEMS post process necessary to realize the folded arms and the suspension of the transistor. In standard CMOS process there are several metallization layers. In TMOS production the upper ones, made in aluminum or copper, are used as built - in masks. Both metal |
https://en.wikipedia.org/wiki/Gameheads | Gameheads is an Oakland, California-based video game design education program for low-income youth and youth of color.
History
Technology writer Damon Packwood co-founded Gameheads in 2014 to improve diversity in the video games industry and other STEAM fields. Packwood noticed that students in low-income neighborhoods had a lot of focus and interest for video games and DIY (do it yourself) culture, but that the emerging tech diversity movement had not yet extended to video games. While youth of color spend more time playing video games, they make up less than 20% of industry employees.
The Gameheads program was inspired in part by LittleBigPlanet, a game which gives players the ability to design their own levels. Packwood thought it would be interesting if students could use game design to share their experiences.
The organization is based in the United Roots Youth Impact Hub in Oakland, California.
Program
The game design program is for students aged 16-24, covering design, conception, coding, storytelling, writing, and motion capture. The program is a full year, with increased activity during the summer. Whereas the main program is primarily educational, another program, "DevOps", prepares young people for jobs in the San Francisco Bay Area. Industry professionals like designer Tim Schafer act as mentors, and several elements of the programs' design are intended to facilitate getting the students jobs in the games industry.
Students' games often focus on issues that affect them: migration, grief, stereotypes, mental health, motherhood, the Asian-American model minority myth, navigating social spaces, as well as more traditional video game themes. A game featured on NPR's Marketplace called Here's Your Change focuses on gentrification from the perspective of a cashier, communicating the way interactions with customers become more formal and transactional as the buildings get nicer. Throughout the game, the visual and audio design changes along with the n |
https://en.wikipedia.org/wiki/Huygens%20principle%20of%20double%20refraction | Huygens principle of double refraction, named after Dutch physicist Christiaan Huygens, explains the phenomenon of double refraction observed in uniaxial anisotropic material such as calcite. When unpolarized light propagates in such materials (along a direction different from the optical axis), it splits into two different rays, known as ordinary and extraordinary rays. The principle states that every point on the wavefront of birefringent material produces two types of wavefronts or wavelets: spherical wavefronts and ellipsoidal wavefronts. These secondary wavelets, originating from different points, interact and interfere with each other. As a result, the new wavefront is formed by the superposition of these wavelets.
History
The systematic exploration of light polarization began during the 17th century. In 1669, Bartholin made an observation of double refraction in a calcite crystal and documented it in a published work in 1670. Later, in 1690, Huygens identified polarization as a characteristic of light and provided a demonstration using two identical blocks of calcite placed in succession. Each crystal divided an incoming ray of light into two, which Huygens referred to as "regular" and "irregular" (in modern terminology: ordinary and extraordinary). However, if the two crystals were aligned in the same orientation, no further division of the light occurred.
Huygens–Fresnel principle
While the Huygens' principle of double refraction explains the phenomenon of double refraction in an optically anisotropic medium, the Huygens–Fresnel principle pertains to the propagation of waves in an optically isotropic medium. According to the Huygens–Fresnel principle, each point on a wavefront can be considered a secondary point source of waves, so a new wavefront is formed after the secondary wavelets have traveled for a period equal to one vibration cycle. This new wavefront can be described as an envelope or tangent surface to these secondary wavelets. Understan |
https://en.wikipedia.org/wiki/Zhu%20algebra | In the theory of vertex algebras, the Zhu algebra and the closely related C2-algebra are two associative algebras canonically constructed from a given vertex operator algebra. Many important representation theoretic properties of the vertex algebra are logically related to properties of its Zhu algebra or C2-algebra.
Definitions
Let be a graded vertex operator algebra with and let be the vertex operator associated to Define to be the subspace spanned by elements of the form for An element is homogeneous with if There are two binary operations on defined byfor homogeneous elements and extended linearly to all of . Define to be the span of all elements .
The algebra with the binary operation induced by is an associative algebra called the Zhu algebra of of .
The algebra with multiplication is called the C2-algebra of .
Main properties
The multiplication of the C2-algebra is commutative and the additional binary operation is a Poisson bracket on which gives the C2-algebra the structure of a Poisson algebra.
(Zhu's C2-cofiniteness condition) If is finite dimensional then is said to be C2-cofinite. There are two main representation theoretic properties related to C2-cofiniteness. A vertex operator algebra is rational if the category of admissible modules is semisimple and there are only finitely many irreducibles. It has been conjectured that rationality is equivalent to C2-cofiniteness and a stronger condition regularity. Various weaker versions of this conjecture are known, including that regularity implies C2-cofiniteness and that for C2-cofinite the conditions of rationality and regularity are equivalent. This conjecture is a vertex algebras analogue of Cartan's criterion for semisimplicity in the theory of Lie algebras because it relates a structural property of the algebra to the semisimplicity of its representation category.
The grading on induces a filtration where so that There is a surjective morphism of Poisson algebras .
Associ |
https://en.wikipedia.org/wiki/Threads%20%28social%20network%29 | Threads is an online social media and social networking service operated by Meta Platforms. The app offers users the ability to post and share text, images, and videos, as well as interact with other users' posts through replies, reposts, and likes. Closely linked to Meta platform Instagram and additionally requiring users to both have an Instagram account and use Threads under the same Instagram handle, the functionality of Threads is similar to X. The application is available on iOS and Android devices, while a web version offers limited functionality. It is the fastest-growing consumer software application in history, gaining over 100 million users in its first five days, surpassing the record previously set by ChatGPT. Its early success was not sustained and the user base of the app plummeted more than 80% to 8 million daily active users by the end of July, although its popularity has since begun to recover.
After Elon Musk's acquisition of Twitter in October 2022, Meta employees explored the concept of introducing text-based functionality to Instagram. This feature, known as Instagram Notes, was rolled out in December 2022. The company subsequently began developing a separate app focused on text-based posts. Development on Threadsinternally known as "Project 92"commenced in January 2023, with the platform officially launching on July 5, 2023. Threads immediately became available in 100 countries (out of 193 UN member states), but has delayed its launch in the European Union as it waits for regulatory clarity from the European Commission regarding the service's data collection policies.
History
Predecessor
In October 2019, Threads was introduced as a separate app available for Android and iOS. This app's functionality resembled that of Snapchat, allowing users to communicate through messaging and video chats. It was integrated with Instagram's "Close friends" feature, so that users could send images, photos, and texts privately to others, and was embedded w |
https://en.wikipedia.org/wiki/Damper%20winding | The damper winding (also amortisseur winding) is a squirrel-cage-like winding on the rotor of a typical synchronous electric machine. It is used to dampen the transient oscillations and facilitate the start-up operation.
Since the design of a damper winding is similar to the one of the asynchronous motor, the winding technically enables the direct-on-line start and can even be used for the motor operation in the asynchronous mode.
Originally the damper winding was invented by Maurice Leblanc in France and Benjamin G. Lamme in the US to deal with the problem of hunting oscillations due to the early generators being driven by the directly connected steam engines with their pulsating torque. In the modern designs the generators are driven by turbines and the issue of hunting is less important, although pulsating torque is still encountered by motors, for example, while driving the piston compressors.
The construction of the damper windings is complex and largely based on empirical knowledge. A typical damper winding consists of short-circuit bars that in the machines with cylindrical rotors share the slots with the field windings, and in the case of salient pole rotors are located in the dedicated slots on the surfaces of pole shoes. There are no bars in the quadrature axis area of the salient pole machines. The bars are terminated on rings or plates encircling the rotor.
References
Sources
Electrical engineering
Electromagnetic coils |
https://en.wikipedia.org/wiki/Athene%20cunicularia%20arubensis | Athene cunicularia arubensis, also known as the Aruban burrowing owl or shoco, is an endemic subspecies of burrowing owl in Aruba. Since 2015, the shoco has become a national symbol of Aruba.
Taxonomy
In the IOC World Bird List, the subspecies A. c. arubensis is no longer listed separately but has been merged with the subspecies A. c. brachyptera.
Characteristics
The shoco has a head-to-tail length of 18 to 25 centimeters. Notable features include large round yellow eyes, prominent whitish eyebrows, absent ear tufts, and relatively long gray legs.
Distribution
Based on behavior and vocalizations, it is believed that the shoco is most likely a distinct and separate species of owl. Furthermore, it is suspected that the shoco has been present on Aruba for at least over one and a half million years. Aruba is the only country within the Kingdom of the Netherlands that has a burrowing owl.
Lifestyle and status
The shoco lives in burrows on the ground in areas with low cactus vegetation and dry forests.
If the shoco cannot find a burrow, it will dig one itself in soft ground. Since much of the life history of this subspecies is still unknown, the population is being monitored within the protected area of Arikok National Park.
The shoco has been designated as an endangered species and enjoys legal protection. Despite its popularity, the well-being and survival of the burrowing owl are under great pressure. In the first two decades of the 21st century, the Aruban population grew, along with population density. With 636 persons per square kilometer in 2017, it even exceeded the density of the Netherlands. As a result, the habitat of the shoco is severely limited and fragmented. Furthermore, the unregulated and extreme increase in tourist off-road recreation and the presence of the exotic boa constrictor pose a threat to the survival of the shoco. In 2013, the size of the population was estimated to be less than 200 breeding pairs.
Breeding
The burrow also serves a |
https://en.wikipedia.org/wiki/List%20of%20proposed%20quantum%20registers | A practical quantum computer must use a physical system as a programmable quantum register. Researchers are exploring several technologies as candidates for reliable qubit implementations.
Superconducting quantum computing (qubit implemented by the state of nonlinear resonant superconducting circuits containing Josephson junctions)
Trapped ion quantum computer (qubit implemented by the internal state of trapped ions)
Neutral atoms in optical lattices (qubit implemented by internal states of neutral atoms trapped in an optical lattice)
Quantum dot computer, spin-based (e.g. the Loss-DiVincenzo quantum computer) (qubit given by the spin states of trapped electrons)
Quantum dot computer, spatial-based (qubit given by electron position in double quantum dot)
Quantum computing using engineered quantum wells, which could in principle enable the construction of a quantum computer that operates at room temperature
Coupled quantum wire (qubit implemented by a pair of quantum wires coupled by a quantum point contact)
Nuclear magnetic resonance quantum computer (NMRQC) implemented with the nuclear magnetic resonance of molecules in solution, where qubits are provided by nuclear spins within the dissolved molecule and probed with radio waves
Solid-state NMR Kane quantum computer (qubit realized by the nuclear spin state of phosphorus donors in silicon)
Vibrational quantum computer (qubits realized by vibrational superpositions in cold molecules)
Electrons-on-helium quantum computer (qubit is the electron spin)
Cavity quantum electrodynamics (CQED) (qubit provided by the internal state of trapped atoms coupled to high-finesse cavities)
Molecular magnet (qubit given by spin states)
Fullerene-based ESR quantum computer (qubit based on the electronic spin of atoms or molecules encased in fullerenes)
Nonlinear optical quantum computer (qubits realized by processing states of different modes of light through both linear and nonlinear elements)
Linear optical quantum computer (LOQC) |
https://en.wikipedia.org/wiki/455-line%20television%20system | The 455-line standard, also known as 450-line, was a French black-and-white analog television broadcasting norm employed between 1937 and 1939. It was later replaced by the 441-line format, which remained in use until 1956.
Historical Background
In 1931, in Paris, Georges Mandel, the Minister of Posts, provided support to the Compagnie des Compteurs (CdC) in conducting mechanical television experiments. Engineer René Barthélémy was granted a studio on Rue de Grenelle, Paris for this purpose. The resolution gradually increased from 30 to 60 lines and then to 180 lines by 1935, and the transmitter was located to the Eiffel Tower.
Robert Jardillier, the next Minister of Posts, launched in 1936 a call for tenders to provide television with higher definition, based on the iconoscope and electronic television. A test period would follow and enable the best standard to be chosen.
Broadcasts became regular from January 4, 1937, from 11 to 11:30 am and 8 to 8:30 pm on weekdays and from 5:30 pm to 7:30 pm on Sundays. Grammont performed its tests in 441 lines, the Compagnie Française de Télévision in 450 lines, and Thomson-Houston in 455 lines.
In July 1937, the administration chose the 455-line system designed by Thomson-Houston, followed by public demonstrations at the International Exposition of Art and Technology in Modern Life.
Broadcasts using the previous mechanical system continued alongside the new electronic system until April 10, 1938.
In July 1938, a decree of the Posts, Telegraphs, and Telephones Agency defined the French terrestrial television standard as transmitting on 455 lines VHF (46 MHz, positive visual modulation, 25 frames per second), to be adopted throughout France within three years. 455-line TV sets from brands like Pathe-Marconi, Philips, Radioindustrie, CdC, Grammont, and Emyradio began to be sold to the public.
In 1938, the transmitter, located at the Eiffel Tower, changed to this 455-line format, making it the most advanced and powerful |
https://en.wikipedia.org/wiki/Fiber-reinforced%20cementitious%20matrix | A fiber-reinforced cementitious matrix (FRCM) is a reinforcement system composed by fibers (such as steel, aramid, basalt, carbon, polyparaphenylenebenzobisoxazole, and glass) embedded in an inorganic-based matrix, usually made by cement or lime mortar.
In international literature, FRCMs are also called textile-reinforced concrete (TRC), textile reinforced mortars (TRM), fabric-reinforced mortar (FRM), or inorganic matrix-grid composites (IMG).
Starting from the second decade of the 21st century they are used for the structural rehabilitation of existing buildings, in particular made by masonry (existing and historical) or by reinforced concrete, to increase their load-bearing capacity under both vertical and horizontal loads (including seismic ones).
History
FRCM efficacy stands in the association of more materials together to give better mechanical properties to the structural systems. An historical example that shares some features with FRCM is the association of sun-dried clay and straw for the production of bricks in Mesopotamia, or the Roman cocciopesto. The first FRP composite materials appeared in the 1940s in aeronautical engineering. FRCM composite materials, on the other hand, have seen their first applications in the early years of the 21th century. Indeed, in the second decade of the same century, FRCMs have joined the now classic FRPs in terms of importance for structural rehabilitation. This is due to the fact that the inorganic matrix has shown numerous advantages, compared with the organic counterpart (FRP), including a better response when applied to fragile substrates such as masonry and reinforced concrete, thanks to the greater compatibility of the mortar layer when applied on such substrates.
Properties
FRCM composites constitute systems or kits according to the definition set out in point 2 of the art. 2 of EU Regulation 305/2011. They are composed by two fundamental components: an inorganic matrix and a reinforcement. Sometimes, to impr |
https://en.wikipedia.org/wiki/MRNA-4157/V940 | mRNA-4157/V940 is an experimental drug being investigated for use against skin and pancreatic cancer.
History
mRNA-4157/V940 was initially developed by Moderna. In 2022 Moderna and Merck jointly put mRNA-4157/V940 into clinical trials in combination with Merck's cancer immunotherapy drug pembrolizumab. In February 2023, the Food and Drug Administration granted mRNA-4157/V940 breakthrough status.
Mechanism of action
mRNA-4157/V940 is an mRNA based cancer vaccine. When used, it produces one of several dozen possible abnormal proteins commonly found in cancerous tissues. The production of those proteins is intended to invoke an immune response.
mRNA-4157/V940 is given to patients after their tumors have been sequenced and abnormal proteins identified. The drug is then customized to match a patient's tumor, which makes it an example of personalized medicine.
References
Tumor markers
Cancer vaccines
Personalized medicine
Biotechnology
RNA vaccines |
https://en.wikipedia.org/wiki/Private%20cloud%20computing%20infrastructure | Private cloud computing infrastructure is a category of cloud computing that provides comparable benefits to public cloud systems, such as self-service and scalability, but it does so via a proprietary framework. In contrast to public clouds, which cater to multiple entities, a private cloud is specifically designed for the requirements and objectives of one organization.
Definition
A private cloud computing infrastructure constitutes a distinctive model of cloud computing that facilitates a secure and distinct cloud environment where only the intended client can function. It can either be physically housed in the organization's in-house data center or be managed by a third-party provider. In a private cloud, the infrastructure and services are always sustained on a private network, and both the hardware and software are devoted exclusively to a single organization.
History
The concept of private cloud infrastructure started to take shape around the mid-2000s, coinciding with the rise of other cloud computing forms. It came into existence as a solution to the shortcomings of public clouds, particularly concerns over data control, security, and network performance. IT departments began to mirror the automation and self-service features of the public cloud in their data centers. Over time, these services became more advanced, and private cloud technology has been refined to address businesses and organizations' diverse needs.
Architecture
Private cloud computing infrastructure generally involves a mix of hardware, network infrastructure, and virtualization software.
The hardware, often referred to as a cloud server or cloud array, consists of a server rack or a collection of server racks containing the storage and processors that constitute the cloud.
The virtualization software, such as Hyper-V, OpenStack, or VMWare, establishes and oversees virtual machines with which users interact.
The network infrastructure connects the private cloud to users and may fa |
https://en.wikipedia.org/wiki/Audio%20inpainting | Audio inpainting (also known as audio interpolation) is an audio restoration task which deals with the reconstruction of missing or corrupted portions of a digital audio signal. Inpainting techniques are employed when parts of the audio have been lost due to various factors such as transmission errors, data corruption or errors during recording.
The goal of audio inpainting is to fill in the gaps (i.e., the missing portions) in the audio signal seamlessly, making the reconstructed portions indistinguishable from the original content and avoiding the introduction of audible distortions or alterations.
Many techniques have been proposed to solve the audio inpainting problem and this is usually achieved by analyzing the temporal and spectral information surrounding each missing portion of the considered audio signal.
Classic methods employ statistical models or digital signal processing algorithms to predict and synthesize the missing or damaged sections. Recent solutions, instead, take advantage of deep learning models, thanks to the growing trend of exploiting data-driven methods in the context of audio restoration.
Depending on the extent of the lost information, the inpaintining task can be divided in three categories.
Short inpainting refers to the reconstruction of few milliseconds (approximately less than 10) of missing signal, that occurs in the case of short distortions such as clicks or clipping.
In this case, the goal of the reconstruction is to recover the lost information exactly.
In long inpainting instead, with gaps in the order of hundreds of milliseconds or even seconds, this goal becomes unrealistic, since restoration techniques cannot rely on local information.
Therefore, besides providing a coherent reconstruction, the algorithms need to generate new information that has to be semantically compatible with the surrounding context (i.e., the audio signal surrounding the gaps).
The case of medium duration gaps lays between short and long inpainti |
https://en.wikipedia.org/wiki/Dattorro%20industry%20scheme | The Dattorro industry scheme is a digital system used to implement a wide range of delay-based audio effects for digital signals. It was proposed by Jon Dattorro. The common nature of these effects allows to produce an output signal as the linear combination of (dynamically modulated) delayed replicas of the input signal. The proposed scheme allows to implement such effects in a compact form, only using a set of three parameters to control the type of effect.
The Dattorro industry scheme is based on digital delay lines and to ensure a proper resolution in the time domain, it leverages fractional delay lines, thus avoiding discontinuities.
The effects that this scheme is able to produce are: echo, chorus, vibrato, flanger, doubling, white chorus. These effects are characterized by a nominal delay, a modulating function for the delay and the depth of modulation.
Delay line interpolation
Consider continuous time signal . The -delayed version of such signal is . Considering the signal in the discrte time domain (i.e., sampling it with sampling frequency at ), we obtain . The delay line can then be described in terms of the Z-transform of the discrete time signal as
.
When going back in the time domain exploiting the inverse Z-transform, this corrsponds to , where is the Dirac delta. The former equation holds for but for the implementation we need a fractional delay, meaning . In this case, interpolation is required to reconstruct the value of the signal that lies between two samples. One can resort to the preferred interpolation technique, e.g., Lagrange interpolation, or all-pass interpolation.
Block diagram
The output of the delay block is noted above and below as rarely it is taken from the last sample of the tap but instead it changes dynamically. Considering the end to end structure, we can write the filter as:
Setting the coefficients according to the desired effect results in a change of the filter topology. For example, setting the feedback to |
https://en.wikipedia.org/wiki/UWB%20ranging | Ultra-wideband impulse radio ranging (or UWB-IR ranging) is a wireless positioning technology based on IEEE 802.15.4z standard, which is a wireless communication protocol introduced by IEEE, for systems operating in unlicensed spectrum, equipped with extremely large bandwidth transceivers. UWB enables very accurate ranging (in the order of centimeters) without introducing significant interference with narrowband systems. To achieve these stringent requirements, UWB-IR systems exploit the available bandwidth (which exceeds 500 MHz for systems compliant to IEEE 802.15.4z protocol) that they support, which guarantees very accurate timing (and thus ranging) and robustness against multipath, especially in indoor environments. The available bandwidth also enables UWB systems to spread the signal power over a large spectrum (this technology is thus called spread spectrum), avoiding narrowband interference.
Protocol
UWB-IR relies on the low-power transmission of specific sequences of short-duration pulses. The transmit power is limited according to FCC regulations, in order to reduce interference and power consumption. The bands supported by the standard are the following ones:
The sub-gigahertz band, which contains only 1 channel and ranges from 249.6 MHz to 749.6 MHz.
The low band, which contains 4 channels and ranges from 3.1 GHz to 4.8 GHz.
The high band, which contains 11 channels and ranges from 6.0 GHz to 10.6 GHz.
The primary time division in UWB systems is structured in frames. Each frame is composed by the concatenation of 2 sequences:
The first one is called preamble (also known as SHR or synchronization header) and consists of a header, known a priori both at transmitter and receiver side. It is employed for synchronization purposes.
The second one is called physical layer protocol data unit (abbreviated to PPDU) and contains the data to communicate, which are known a priori only at transmitter side.
The further time subdivisions of the preamble and t |
https://en.wikipedia.org/wiki/AI-assisted%20reverse%20engineering | AI-assisted reverse engineering (AIARE) is a branch of computer science that leverages artificial intelligence (AI), notably machine learning (ML) strategies, to augment and automate the process of reverse engineering. The latter involves breaking down a product, system, or process to comprehend its structure, design, and functionality. AIARE was primarily introduced in the early years of the 21st century, witnessing substantial advancements from the mid-2010s onwards.
Overview
Conventionally, reverse engineering is conducted by specialists who dismantle a system to grasp its working principles, often for the purposes of reproduction, modification, enhancement of compatibility, or forensic examination. This method, while efficient, can be laborious and time-intensive, particularly when dealing with intricate software or hardware systems.
AIARE integrates machine learning algorithms to either partially automate or augment this process. It is capable of detecting patterns, relationships, structures, and potential vulnerabilities within the analyzed system, frequently surpassing human experts in speed and accuracy. This has rendered AIARE a critical tool in numerous fields, including cybersecurity, software development, and hardware design and analysis.
Techniques
AIARE encompasses several AI methodologies:
Supervised learning
Supervised learning employs tagged data to train models to recognize system components, their operations, and their interconnections. This method is particularly helpful in software analysis to discover vulnerabilities or enhance compatibility.
Unsupervised learning
Unsupervised learning is utilized to detect concealed patterns and structures in untagged data. It proves beneficial in comprehending complex systems where there's no evident labeling or mapping of components.
Reinforcement learning
Reinforcement learning is employed to build models that progressively refine their system understanding through a process of trial and error. Th |
https://en.wikipedia.org/wiki/Asant%C3%A9%20Technologies | Asanté Technologies, Inc., was an American computer networking equipment manufacturer active between 1988 and 2005. Founded in Sunnyvale, California, the company was for a time the market leader in networking products for Apple's line of Macintosh computers, providing hubs, switches, routers, and other equipment. The computer also dabbled in the PC-compatible and enterprise networking markets. Following a period of declining market share and stagnation between 1998 and 2005, the company was acquired by rival TechnoConcepts in 2005.
History
Foundation (1988–1991)
Asanté Technologies, Inc., was incorporated in 1988 from a small warehouse in Sunnyvale, California. The co-founders, Jeff Lin and Wilson Wong, had immigrated to California from Taiwan and Hong Kong in the 1960s, both graduating with electrical engineering degrees in the early 1970s. The two met in Mountain View, California, in 1983 at a Chinese-language Christian church and soon after found themselves working at the same computer networking equipment vendor in the city. Both shared a dream of starting their own networking companies and decided to quit their jobs to found Asanté. The name for the company derives from the French toast Santé (health), prefixed with an "A" to make the name appear higher in catalog listings for networking equipment manufacturers.
Lin and Wong set out the company to offer user-friendly products but had to first find a niche within the crowded market consumer networking peripherals. The two identified a gap in the market by honing in on Apple's line of Macintosh computers, which had lacked a robust range of Ethernet-based products that the IBM PC and compatibles were enjoying. With Ethernet connections, Mac-based local area networks (LANs) of the day could potentially reach bit rates than could be achieved with Apple's own LocalTalk. Rather than try to compete in the intensely crowded IBM PC compatible arena, the co-founders aimed for Asanté to be the market leader for Ethernet |
https://en.wikipedia.org/wiki/Combinatorial%20Theory%20%28journal%29 | Combinatorial Theory is a peer-reviewed diamond open access mathematical journal specializing in the field of combinatorics. It was established in 2021, when the vast majority of the editorial board of the Elsevier-published Journal of Combinatorial Theory left to create a new journal.
Operations
Combinatorial Theory operates on a diamond open access model, in which publication costs are underwritten by voluntary contributions from universities, foundations, and other organizations. Authors do not pay submission fees or article processing charges, and the journal belongs to the Free Journal Network. All content is published under a Creative Commons license.
The journal's editorial board consists of approximately 50 mathematicians, and includes Timothy Gowers and June Huh. It follows a doubly-anonymous review process, in which author names are not disclosed to reviewers.
Abstracting and indexing
The journal is abstracted and indexed in the Directory of Open Access Journals, the Free Journal Network, Mathematical Reviews, and Zentralblatt Math.
References
External links
Academic journals established in 2021
Combinatorics journals
Quarterly journals
Open access journals
Creative Commons-licensed journals |
https://en.wikipedia.org/wiki/9855 | 9855 (nine thousand eight hundred fifty-five) is an odd, composite, four-digit number. The number 9855 is the magic constant of an n × n normal magic square as well as n-Queens Problem for n = 27. It can be expressed as the product of its prime factors:
9855 is also the Magic constant of a Magic square of order 27. In a magic square, the magic constant is the sum of numbers in each row, column, and diagonal, which is the same. For magic squares of order n, the magic constant is given by the formula .
The magic constant 9855 for the magic square of order 27 can be calculated as follows:
This square contains the numbers 1 to 729, with 365 in the center. The square consists of 9 nine power magic squares. It has been noted that the number of days in 27 years (365 days per year) is 9855, the constant of the larger square. This was first discovered and solved by ancient Greeks: Aristotle understood this magic square, but it is noted from numeris Platonics nihil obscuris that Cicero was unable to solve it. The 27 years as alluded to by the square was mentioned in reference to Greek generation time.
References
Integers |
https://en.wikipedia.org/wiki/Open-circuit%20saturation%20curve | The open-circuit saturation curve (also open-circuit characteristic, OCC) of a synchronous generator is a plot of the output open circuit voltage as a function of the excitation current or field. The curve is typically plotted alongside the synchronous impedance curve.
At the low field, the permeable iron in the magnetic circuit of the generator is not saturated, therefore the reluctance almost entirely depends on the fixed contribution of the air gap, so the part of the curve that starts at the point of origin is a linear "air-gap line" (output voltage is proportional to the excitation current). As the iron saturates with higher excitation and thus higher magnetic flux, the reluctance increases, and the OCC deflects down from the air-gap line.
The curve is obtained by rotating the generator at the rated RPM with the output terminals disconnected and the output voltage typically going to at least 120% of the rated for the device. The hydraulic units sometimes have to be tested at lower RPM with the resulting voltage scaled up to accommodate the differences in frequency. Since the test goes above the rated voltage, the step-up transformer is typically also disconnected to avoid damaging it.
References
Sources
Electrical generators |
https://en.wikipedia.org/wiki/Synchronous%20impedance%20curve | The synchronous impedance curve (also short-circuit characteristic, SCC) of a synchronous generator is a plot of the output short circuit current as a function of the excitation current or field. The curve is typically plotted alongside the open-circuit saturation curve.
The SCC is almost linear, since under the short-circuit conditions the magnetic flux in the generator is below the iron saturation levels and thus the reluctance is almost entirely defined by the fixed one of the air gap. The name "synchronous impedance curve" is due to the fact that in the short-circuit condition all the generated voltage dissipates across the generator internal synchronous impedance .
The curve is obtained by rotating the generator at the rated RPM with the output terminals shorted and the output current going to 100% of the rated for the device (higher values are typically not tested to avoid overheating).
References
Sources
Electrical generators |
https://en.wikipedia.org/wiki/Coalescent%20angiogenesis | Angiogenesis is the process of the formation of new blood vessels from pre-existing vascular structures, which is needed for oxygenation of - and providing nutrients to - expanding tissue. Angiogenesis takes place through different modes of action. Coalescent angiogenesis is a mode of angiogenesis where vessels coalesce or fuse to increase blood circulation. This process transforms an inefficient net structure into a more efficient treelike structure. It is the opposite of intussusceptive angiogenesis, which is where vessels split to form new vessels.
Background
While the most studied mode of angiogenesis is sprouting angiogenesis, several different modes of angiogenesis have been described. Among these are intussusceptive angiogenesis or splitting angiogenesis, vessel cooption, and vessel elongation. A novel form of angiogenesis is the process called ‘’’coalescent angiogenesis’’’, which is the opposite of intussusceptive angiogenesis. This mode of angiogenesis was reported from studies of long-term time-lapse microscopy in the vasculature of the chick chorioallantoic membrane (CAM), where this novel non-sprouting mode for vessel generation was observed.
Specifically, isotropic capillary meshes enclosing tissue islands evolve into preferred flow pathways consisting of larger blood vessels transporting more blood in a faster pace. These preferential flow pathways progressively enlarge by coalescence of capillaries and elimination of internal tissue pillars, in a fast time frame of hours. This way coalescent angiogenesis is the reverse of intussusceptive angiogenesis. Concomitantly, less perfused segments of the vasculature regress. An initially mesh-like capillary network is remodelled into a tree structure, while conserving vascular wall components and maintaining blood flow. Coalescent angiogenesis, thus, describes the remodelling of an initial hemodynamically inefficient mesh structure, into a hierarchical tree structure that provides efficient convective transp |
https://en.wikipedia.org/wiki/18650%20battery | An 18650 battery is a cylindrical lithium-ion battery common in electronic devices. The batteries measure 18mm in diameter by 65mm in length, giving them the name 18650.
Panasonic first developed the 18650 battery "in 1994 when there was a growing need for ever smaller and lighter storage batteries that could be used for ever longer periods of time". They are now commonly used in power tools, electric bicycles, laptops, and electric vehicles.
Chemistry
18650 batteries are most commonly lithium-based, although sodium-ion variants are available for purchase. Lithium-ion batteries consist of an anode, typically made of graphite and a cathode, often of lithium-metal oxide.
References
Battery shapes
Lithium-ion batteries
Battery (electricity)
Rechargeable batteries |
https://en.wikipedia.org/wiki/Check-in%20QR%20code | The check-in code or the venue code (, Chǎngsuǒgmǎ) is a QR code to record check-in locations for contact tracing and epidemiologic investigations. It was widely used in Australia and China during the COVID-19 pandemic in 2020–2022.
Mechanism
Because of the COVID-19 pandemic, some regulations were made for contact tracing, and then some governments required people to scan a QR code to record their locations of all the places that they have visited. As for the example of the Suzhou venue code, the QR code was generated via WeChat by the asset owner or the landlord, and then the location and the person would be recorded when the QR code scanner scanned this QR code.
Purposes
As all the people scan the QR code when they visit specific locations, their locations and their personal information are recorded. If one of them is infected with COVID-19, people who have visit the same location will be warned, which is convenient for epidemiologic investigations.
See also
Health Code
Hong Kong Health Code
References
Software associated with the COVID-19 pandemic
COVID-19 contact tracing apps
Barcodes |
https://en.wikipedia.org/wiki/.debug%20info |
Introduction
The .debug_info section of an ELF contains information generated by compilers to describe the source code while debugging by keeping symbols and its type, scope, file, line number, etc. The .debug_info section is one of the main components of DWARF debug info files. This is generated by a compiler when -g switch or its variants are used.
Other debug ELF sections
References
Debugging |
https://en.wikipedia.org/wiki/Kato%27s%20inequality | In functional analysis, a subfield of mathematics, Kato's inequality is a distributional inequality for the Laplace operator or certain elliptic operators. It was proven in 1972 by the Japanese mathematician Tosio Kato.
The original inequality is for some degenerate elliptic operators. This article treats the special (but important) case for the Laplace operator.
Inequality for the Laplace operator
Let be a bounded and open set, and such that . Then the following holds
in ,
where
is the space of locally integrable functions – i.e., functions that are integrable on every compact subset of their domains of definition.
Remarks
Sometimes the inequality is stated in the form
in
where and is the indicator function.
If is continuous in then
in .
Literature
References
functional analysis
Inequalities
Differential operators |
https://en.wikipedia.org/wiki/2023%20Bangladesh%20Government%20website%20data%20breach | In June and July 2023, a major data breach occurred in a Bangladesh Government website, resulting in the unauthorized exposure and compromise of personal data belonging to more than 50 million Bangladeshi citizens.
Background
On July 7, 2023, it was discovered that a government website in Bangladesh had inadvertently exposed the personal data of citizens due to security vulnerabilities. The breach was not a result of a deliberate hack, but rather a consequence of weaknesses in the infrastructure and data protection practices of the websites. The exposed data included sensitive information such as names, addresses, phone numbers, and national identification numbers. From October 2023, the leaked NID data of Bangladeshi citizens are openly accessible on Telegram channels.
Breach incident
The breach was initially reported by American technology news website TechCrunch, on July 7, 2023. According to their reports, the exposed data was accessible via the government website, potentially allowing unauthorized individuals to access and misuse citizens' personal information. They initially did not reveal the website's name as breached data were still accessible, however they later revealed that the data breach occurred in the Office of the Registrar General, Birth & Death Registration website. The incident raised concerns about privacy and data security, causing alarm among affected individuals.
Zunaid Ahmed Palak, the state minister for Information and Communication Technology in Bangladesh, acknowledged the breach and clarified that it was not the result of hacking but rather a consequence of the security weaknesses presents in the websites. Palak further explained that the websites had vulnerabilities that were exploited, resulting in the exposure of citizens' personal data.
Government Response
In response to the data breach, the Bangladesh government took action to address the situation. On July 10, 2023, the government announced the takedown of the exposed citize |
https://en.wikipedia.org/wiki/Cyber%20Assessment%20Framework | The Cyber Assessment Framework is a mechanism designed by NCSC for assuring the security of organisations. The CAF is tailored towards the needs of Critical National Infrastructure, to meet the NIS regulations, but the objectives can be used by other organisations.
In addition to national public-sector and infrastructure bodies, the CAF is also being used by local government.
Principles
The CAF has fourteen objectives, grouped into four categories: These set high-level objectives which fit the needs of organisations handling high-impact data or performing essential functions. These have some similarities, but are not identical, to the categories of controls used by ISO 27001:2013.
Objective A: Managing security risk
A.1 Governance
A.2 Risk management
A.3 Asset management
A.4 Supply chain
Objective B: Protecting against cyber attack
B.1 Service protection policies and procedures
B.2 Identity and access control
B.3 Data security
B.4 System security
B.5 Resilient networks and systems
B.6 Staff awareness and training
Objective C: Detecting cyber security events
C.1 Security monitoring
C.2 Anomaly detection
Objective D: Minimising the impact of cyber security incidents
D.1 Response and recovery planning
D.2 Improvements
Each of these are linked to "outcomes" and "contributing outcomes". There are a total of 14 outcomes and 39 contributing outcomes. NCSC has published Indicators of Good Practice; IGP tables can be used to assess whether each objective has been "Achieved", "Not achieved", or "Partially achieved". Organisations are expected to self-assess, and to draw up an improvement roadmap. Competent Authorities review the assessment and the roadmap.
Further reading
Introduction to the Cyber Assessment Framework
See also
ISO 27001
GovAssure
Cyber Essentials
Security Policy Framework
References
Cybercrime in the United Kingdom
Government of the United Kingdom
Information technology organisations based in the United Kingdom
National security of t |
https://en.wikipedia.org/wiki/Smart%20data%20capture | Smart data capture (SDC), also known as 'intelligent data capture' or 'automated data capture', describes the branch of technology concerned with using computer vision techniques like optical character recognition (OCR), barcode scanning, object recognition and other similar technologies to extract and process information from semi-structured and unstructured data sources. IDC characterize smart data capture as an integrated hardware, software, and connectivity strategy to help organizations enable the capture of data in an efficient, repeatable, scalable, and future-proof way. Data is captured visually from barcodes, text, IDs and other objects - often from many sources simultaneously - before being converted and prepared for digital use, typically by artificial intelligence-powered software. An important feature of SDC is that it focuses not just on capturing data more efficiently but serving up easy-to-access, actionable insights at the instant of data collection to both frontline and desk-based workers, aiding decision-making and making it a two-way process.
Smart data capture automates and accelerates capture, applying insights in real time and automating processes based on extracted input. Smart data capture is designed to be repeatable and scalable to reduce low-level manual tasks and eliminate human error. To achieve this goal, smart data capture solutions are often made available using specialist software installed on commodity hardware such as smartphones. However, some solutions may rely on specialized hardware such as dedicated scanning devices, wearables or shop floor robots.
Differences from OCR
Optical character recognition applications are typically concerned with the actual data capture process; they are intended to faithfully reproduce text, words, letters and symbols from a printed document. Smart data capture is multimodal, capable of extracting data from a wider range of semi-structured and unstructured sources, going beyond basic text rec |
https://en.wikipedia.org/wiki/Weverse | Weverse (also stylized as WeVerse; : romanized: wibeoseu) is a South Korean mobile app and web platform created by South Korean entertainment company Hybe Corporation. The app specializes in hosting multimedia content and artist-to-fan communications for musicians while its e-commerce counterpart, Weverse Shop (formerly known as Weply), sells artist-related merchandise and subscriptions for content on Weverse.
Weverse hosts a variety of free and paid content including educational and entertainment videos, Instagram Story-style updates, and artist-to-fan interactions and communities for users to connect with each other. The app is also used to publish official statements by Hybe (formerly Big Hit Entertainment) on behalf of artists signed with its labels.
The software was developed by Hybe's technology subsidiary Weverse Company (formerly beNX). By March 2020, Weverse had 1.4 million daily users and Weverse Shop over 1.8 million users from 200 countries. As of 2022, Weverse has over 6.8 million monthly users.
Development
The app was developed by Weverse Company (formerly beNX), a subsidiary technology company of Hybe Corporation (formerly Big Hit Entertainment) specializing in digital platforms and customer service. According to Weverse Company president, Seo Wooseok, the app was developed to offer a platform for K-pop artists to interact with fans "on a deeper level" than that offered by YouTube or Twitter, which emphasize content delivery over communication. Hybe co-CEO Lenzo Yoon characterized the app as a "one-stop service within the music industry."
According to Jenny Zha, CEO of the digital media consultancy firm Infinitize, K-pop "market leaders like BTS", who have amassed significant fan followings, no longer need to focus on being discovered but rather on monetization and ownership of their content. Zha, in an interview with Billboard, explained that "labels want to [...] create an asset they can own and mobilize for other artists and ventures because t |
https://en.wikipedia.org/wiki/BusLogic | BusLogic, Inc. (originally BusTek, Inc.), was an American computer company active from 1988 to 1996. It specialized in the production of Small Computer System Interface (SCSI) device controller chips and controller expansion cards, becoming a dominant player in that market, behind only Adaptec. In 1996, the company was acquired by Mylex Corporation.
History
Foundation (1988–1993)
BusLogic was founded as BusTek, Inc., in Santa Clara, California, in 1988 by Jesse Chen and Peter Harvey. The company's first product was a DMA controller for desktop computers, dubbed the 86C05. BusTek co-developed the chip with NCR Microelectronics, who also manufactured it. The 86C05 supported multiple desktop buses, including Micro Channel, NuBus, ISA, and EISA. In September 1990, BusTek delivered the first bus-mastering SCSI host adapter card for EISA machines, called the BT-742A, which incorporated BusTek's own 80C10 ASIC. A SCSI host adapter card with bus mastering was widely anticipated in the burgeoning EISA market, as it was one of the last steps in making EISA systems competitive in terms of both performance and flexibility against IBM's proprietary Micro Channel architecture, which had such SCSI cards since early 1989. BusTek followed up with the BT-747S/BT-747D and BT-542S/BT-542D in 1991, based on their second-generation 80C20 ASIC. All four cards were based on the SCSI-2 standard; the BT-747 series comprise Fast SCSI adapter cards for the PC/AT and compatibles, while the BT-542D series comprise Wide SCSI adapter cards for EISA systems. The S and D suffixes denote single-ended and differential SCSI interfaces, respectively.
In July 1992, BusTek acquired San Diego, California–based Chantal Systems—a developer of RAID management software—for an undisclosed sum. Following the acquisition, BusTek changed their name to BusLogic, reflecting a broader focus on both software and hardware. The eight remaining employees of Chantal were integrated into BusLogic; the former company h |
https://en.wikipedia.org/wiki/IEEE%20802.11bb | IEEE 802.11bb is a line-of-sight light-based wireless networking standard that is part of the 802.11 suite of standards, which defines an interoperable communications protocol for Li-Fi devices. Its proponents state that it will allow for very high speed communication that is faster than Wi-Fi.
The 802.11bb standard describes the use of light in the near-infrared 800 to 1000 nm waveband to implement data rates between 10 Mbit/s and 9.6 Gbit/s, with interoperability between devices with different capabilities.
Development of 802.11bb was carried out by the IEEE 802.11 Light Communications Task Group. Companies participating in the standardization effort included pureLiFi and Fraunhofer HHI.
See also
ITU-T G.9991, an ITU standard for line of sight optical networking approved in 2019
IrDA, an early low-speed infrared communication protocol
References
External links
802.11 Light Communications Task Group website
Networking standards
Wireless communication systems
IEEE 802.11
Optical communications |
https://en.wikipedia.org/wiki/Jink%C5%8Dki | Jinkōki (, じんこうき, , Permanent Mathematics) is a three-volume work on Japanese mathematics, first edited and published by Yoshida Mitsuyoshi in 1627. Over his lifetime, Mitsuyoshi revised Jinkōki several times. The edition released in the eleventh year of the Kan'ei era (1641) became particularly widespread. The last version personally published by Mitsuyoshi was the Idai (), which came out in the eighteenth year of the Kan'ei (1634). Subsequent to that, various editions of Jinkōki were released, one of which includes Shinpen Jinkōki ().
The Jinkouki is partly based on the works of Yuan dynasty mathematicians in China.
The Jinkouki is also one of the most popular and influential Japanese mathematics books in history, having influenced many later Japanese mathematicians such as Seki Takakazu and Kaibara Ekken.
Etymology
In Chinese, the characters 塵劫記 () literally mean "dust tribulation record", where 劫 can mean a calamity or kalpa (a unit of time in Buddhism). In Buddhism, one aeon or kalpa (劫) is related to the age of the universe. Then in Chinese, the phrase 塵劫 / 尘劫 means an infinite, boundless kalpa. Thus in the Jinkouki, the 塵劫 is translated as "permanence". Later on 尘劫 has also been taken to refer to the calamities and tribulations of the mortal world (尘世).
The name 尘劫记 is derived from the 尘点劫 of the Buddhist Lotus Sutra (法华经 in the Chinese translation).
Contents
The book contained instructions for dividing and multiplying with a soroban and mathematical problems relevant to merchants and craftsmen. The book also contained several interesting mathematical problems, and was the first Japanese book to use printing in colour. As a result, the Jinkōki became the most popular Japanese mathematics book ever and one of the most widely read books of the Edo period. Mitsuyoshi made reference to everyday problems, such as buying and selling rice.
The book was originally published in three volumes, the first of which mainly describes multiplication and division usin |
https://en.wikipedia.org/wiki/New%20Media%20Corporation | New Media Corporation, also known as New Media Technology Corporation, was an American computer company active from 1992 to the early 2000s. The company focused on the design and manufacture of PC Cards, a type of expansion card bus for laptops that had their heyday from the early 1990s to the mid-2000s. New Media was privately held and based out of Irvine, California.
History
New Media Corporation was founded by Carl Perkins, Rod Corder, and Eric McAfee, in Irvine, California, in March 1992. Perkins and Corder had previously worked together in the early 1980s at Rockwell Semiconductor Systems (which later changed their name to Conexant) of Newport Beach, California, where both led a team of chip designers within the company. In 1989, they founded Togai InfraLogic with another business partner. Togai InfraLogic was founded to capitalize on their ideas on designs for math coprocessor chips that each had developed in their spare time. The company later sold a Japanese speech recognition ASIC to Canon. In 1990, Perkins and Corder left Togai InfraLogic over differences of expectations for the company's future with the third business partner. Perkins and Corder both ended up at ITT Inc., designing ASICs for use in expansion card products for personal computers. It was in this capacity that the two got the inspiration to found New Media Corporation. The duo had been observing the fledgling PC Card expansion bus standard for laptops in the early 1990s and believed they could design PC Card products that were both plug-and-play and intuitive to configure. In 1991, they discovered Eric McAfee, an investor of Silicon Beach technology companies, through a mutual friend and decided to hire him as chief financial officer (CFO).
New Media was the first company to manufacture PC Cards in the United States, according to the Orange County Business Journal. Within a year of its existence it gained large laptop manufacturers such as Toshiba and Compaq as clients, manufacturing cards |
https://en.wikipedia.org/wiki/Burp%20Suite | Burp Suite is a software security application used for penetration testing of web applications. Both a free and a paid version of the software are available. The software is developed by the company PortSwigger. The suite includes tools such as a proxy server (Burp Proxy), an indexing robot (Burp Spider), an intrusion tool (Burp Intruder), a vulnerability scanner (Burp Scanner) and an HTTP repeater (Burp Repeater).
See also
OWASP ZAP
References
External links
Computer security software
Free security software
Injection exploits
Java platform software
Web security exploits |
https://en.wikipedia.org/wiki/Projection%20filters | Projection filters are a set of algorithms based on stochastic analysis and information geometry, or the differential geometric approach to statistics, used to find approximate solutions for filtering problems for nonlinear state-space systems.
The filtering problem consists of estimating the unobserved signal of a random dynamical system from partial noisy observations of the signal. The objective is computing the probability distribution of the signal conditional on the history of the noise-perturbed observations. This distribution allows for calculations of all statistics of the signal given the history of observations. If this distribution has a density, the density satisfies specific stochastic partial differential equations (SPDEs) called Kushner-Stratonovich equation, or Zakai equation.
It is known that the nonlinear filter density evolves in an infinite dimensional function space.
One can choose a finite dimensional family of probability densities, for example Gaussian densities, Gaussian mixtures, or exponential families, on which the infinite-dimensional filter density can be approximated. The basic idea of the projection filter is to use a geometric structure in the chosen spaces of densities to project the infinite dimensional SPDE of the optimal filter onto the chosen finite dimensional family, obtaining a finite dimensional stochastic differential equation (SDE) for the parameter of the density in the finite dimensional family that approximates the full filter evolution. To do this, the chosen finite dimensional family is equipped with a manifold structure as in information geometry.
The projection filter was tested against the optimal filter for the cubic sensor problem. The projection filter could track effectively bimodal densities of the optimal filter that would have been difficult to approximate with standard algorithms like the extended Kalman filter.
Projection filters are ideal for in-line estimation, as they are quick to implement and ru |
https://en.wikipedia.org/wiki/International%20Association%20for%20the%20Study%20of%20Dreams | The International Association for the Study of Dreams (IASD) is a professional nonprofit organization for scientific dream research (oneirology), founded in 1983 and headquartered in the U.S.
Scope
The organization publishes scientific research across all dream-related subjects, including dreams in analytical psychology, oneirology, dreamwork, oneiromancy, and lucid dreaming via its:
International Association for the Study of Dreams Conference―annual conference alternating locations across the globe and in its 40th year since 1983
Dreaming (journal)―published by the American Psychological Association (APA) on behalf of IASD since 1991
International Journal of Dream Research (IJoDR) (ISSN: 1866–7953)―peer-reviewed, indexed in APA's PsycINFO and Elsevier's Scopus databases since 2008, and published on Heidelberg University Library servers
Governance
The nonprofit has historically been led by the following researchers:
Deirdre Barrett, PhD (1995–96, 2023–24)
Mark Blagrove, professor of psychology and dream researcher
Kelly Bulkeley, PhD (1997–98)
Gayle Delaney, PhD (1983–85) - IASD co-founder and Oprah dream expert
Patricia Garfield, PhD (1998–99) - IASD cofounder
Allan Hobson, MD
Notable members
G. William Domhoff, PhD - psychologist and author
Harry Fiss, PhD
Robert Moss
See also
American Psychological Association
References
External links
Carl Jung
Sigmund Freud
Oneirology
Dream
Analytical psychology
Psychoanalytic theory
Psychology organizations based in the United States
Symbols
American Psychological Association
International learned societies
Organizations established in 1983
1983 establishments in California
1983 establishments in the United States
Folsom, California |
https://en.wikipedia.org/wiki/Motorized%20potentiometer | A motorized potentiometer combines a potentiometer with an electric motor.
Uses
Motorized potentiometers can be found in audio/video equipment, specifically mixing consoles. In this application, they are called motorized faders. Mixing consoles with motorized faders typically implement the possibility to save and restore settings on the same console and sometimes to transfer settings to a different console. Save and restore also allows to control more channels then there are sliders by switching which tracks are controlled. While historically, the faders where literal motorized potentiometers, nowadays faders may directly digitize the fader position and apply the value digitally in the digital signal processing.
Motorized potentiometers are used in industrial controls.
Motorized potentiometers may be used for remote control applications.
Motorized potentiometers can be used to build electrical/electronic analog computers. The motorized potentiometer can act as a computing element, but also as a way to convert a physical into an electrical value.
Servo (radio control) are motors that use a potentiometer as feedback for the servo position.
Features
Some motorized potentiometers allow both manual and motorized operation.
Motorized potentiometers can be slide or rotary potentiometers. There also exist multiple turn motorized potentiometers.
The end of travel may be detected using limit switches, a peak in motor current as the mechanism stalls, or a separate resistive element used for position feedback.
History
Given that the history of the motorized potentiometer is linked to electronic analog computers, and electronic analog computers to military use, recording keeping and publication were limited, also meaning that parallel invention was highly likely. The M9 Gun Director had a potentiometer controlled by op amps. The Bomben-Abwurfrechner BT-9 has a motor driven potentiometer to convert a pressure into a potentiometer setting.
In 1968 a patent was fil |
https://en.wikipedia.org/wiki/Henry%20Antwi | Henry Antwi is an Australian based mining engineer an mineral economist He is a fellow of the Australasian Institute of Mining and Metallurgy (AusIMM) and the founder and sponsor of the Tarkwa Student Chapter of AusIMM at the University of Mines and Technology, Ghana.
Biography
He attended Osei Tutu secondary school, Mfantsipim, and the UST School of Mines in Ghana. He continued his study in the Camborne School of Mines in England, where he earned a Bachelor's degree in engineering, and later attended the Colorado School of Mines in the United States to earn a Master's degree in engineering.
He obtained a Graduate Diploma in Business from Curtin University of Technology in Australia to diversify his studies.
References
Year of birth missing (living people)
Living people
Ghanaian engineers
Mining in Ghana |
https://en.wikipedia.org/wiki/List%20of%20conditions%20with%20craniosynostosis | Craniosynostosis, a condition in which the sutures of the head (joints between the bones of the skull) prematurely fuse and subsequently alter the shape of the head, is seen in multiple conditions, as listed below. The level of involvement varies by condition and can range from minor, single-suture craniosynostosis to major, multisutural craniosynostosis.
0-9
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
R
S
T
V
Z
References
Medical lists
craniosynostosis
Cranial sutures
Syndromes affecting head size |
https://en.wikipedia.org/wiki/QR%20Ph | National QR Code Standard or QR Ph is the standardized quick-response code system adopted in the Philippines, which is based on the Europay-Mastercard-VISA (EMV) standard. It serves as a swift and secure payment method for customers of both participating banks and non-bank electronic money issuers (EMI) in the country. Through QR Ph, users can conduct various transactions, including payments, fund transfers, and receipts from different bank and e-money accounts within the Philippines. The implementation of QR Ph has been officially endorsed by the Philippine Payments Management, Inc., following the guidelines set forth in Circular 1055 by the Bangko Sentral ng Pilipinas.
Overview
As part of the BSP's commitment to ensuring secure and dependable payment systems in the Philippines, mandated under Republic Act (R.A.) No. 11127 or the National Payment Systems Act, all payment service providers (PSPs) must comply with the National QR Code Standard, also known as "QR Ph" in this context. The QR Ph standard will be used for QR-enabled payment services provided to end users, in accordance with BSP Circular No. 1055.
The move towards digital payments aligns with the central bank's objective of promoting financial inclusion, particularly for small businesses and consumers, by providing them with convenient options for day-to-day transactions. Then BSP Governor Benjamin Diokno emphasized that this transition supports the goal of making the Philippine society more "cash-light" instead of its current "cash-heavy" state. During the COVID-19 pandemic, the government has encouraged the use of cashless payments to reduce physical contact and provide assistance to small businesses and workers.
BSP Governor Felipe Medalla highlighted the timely implementation of the QR Ph standard as the industry in this space actively develops. The move aims to ensure the support of QR-enabled payments through an interoperable QR Ph standard, facilitating convenience, speed, and ease for PSPs an |
https://en.wikipedia.org/wiki/Charenton%20Metro-Viaduct | The Charenton Metro-Viaduct is a railroad girder bridge located in the French department of Val-de-Marne in the Île-de-France region. It links the communes of Charenton-le-Pont and Maisons-Alfort, crossing the Marne river, as well as the A4 autoroute and 103 departmental road. First put into operation in 1970, the viaduct is used by trains on line 8 of the Paris metro.
The total length of the viaduct is 199 m. Made up of steel beams resting on concrete piers, the viaduct has a continuous gradient, due to the difference in level between the two banks of the Marne. It was renovated for the first time in 2011.
Location
The viaduct is located between the Charenton-Écoles and Maisons-Alfort–Stade stations. It crosses the 103 departmental road, the A4 autoroute and then the Marne. Since Charenton-le-Pont is located on a hillside overlooking the Marne, the viaduct is inclined to compensate for the difference in level between the two stations. The structure is flanked by two tramways, enabling line 8 to return underground.
The surrounding bridges are the Charenton bridge, to the east, and the railway viaduct of the Paris–Marseille railway, to the west. The structure is only a few hundred meters away from the confluence of the Marne and Seine rivers.
Technical specifications
The total length of the viaduct is 199 m, with an average height of 15.05 m between the rail and the water level. The structure has a continuous gradient of 41 mm/m towards Maisons-Alfort. It comprises two 55.5 m central sections and two 30 m lateral sections. The structure rests on six supports for three concrete piles, one of which is set in the riverbed.
The steel deck is designed to aesthetically blend into the landscape. It consists of a continuous beam supported by two vertical solid-core girders located between the two tracks. By enclosing the lower part of the trains, they minimize rolling noise. The track rests on ballast, which is laid on a concrete screed.
History
With the Charenton |
https://en.wikipedia.org/wiki/Remote%20integration%20model | Remote integration model, also known as REMI and at-home production, is a method of live production for television broadcasts and video distribution that transmits live feeds to a single centralized production facility or workflow for integration into a finished feed, which is then distributed to broadcasters.
Initially developed as a less staff- and equipment-intensive alternative to on-site production of live sports events using production trucks or local studios, REMI grew in popularity in 2020 due to the impact of the COVID-19 pandemic on television, which required heavily isolated remote work. However, the practice — particularly in live sports productions — is subject to criticism for the compromises in image quality, stability, and the detachment of commentators and producers operating sometimes thousands of miles from the events they're covering.
History
NBC Sports deployed a remote production workflow for the 1996 Summer Olympics, which were hosted in Atlanta, Georgia. To reduce the amount of on-site staff needed to cover all events, producers instead had taped and time-shifted footage transmitted from events to a single centralized production facility at 30 Rockefeller Plaza in New York City nicknamed the "virtual International Broadcast Center", allowing on-site producers to focus on live broadcasts. NBC continued the practice in subsequent Olympic Games, and in 2013 established a permanent remote International Broadcast Center in Stamford, Connecticut.
Early REMI productions relied on high-bandwidth T1 lines and grew into higher-speed connections and IP routing capabilities as they became available, in order to accommodate increases in broadcast display resolution and the number of cameras in use.
Alongside the growth of in-house REMI studios, independent remote-production service providers expanded into providing full REMI services and commentary on contract to other events and leagues. For example, VISTA Worldlink, which had engaged in global-comme |
https://en.wikipedia.org/wiki/Misskey | Misskey is a free and open-source software used for running self-hosted social networking services. It was originally developed by "syuilo", a Japanese software engineer. The main service was first developed as a bulletin board, but then the open-source community started to add short "Notes" and a timeline function to the service growing it into a microblogging site. Those key features allowed the program and community to grow to its current size.
Overview
A user's post is called a Note. As with other open-source social networks, users can join or create servers. Each server is managed by different administrators, in different locations.
The origin of the Misskey name is from the lyrics of , a song released by the Japanese singer .
History
Development
Misskey publishes its source code to GitHub. The code can be modified as long as it is published under the AGPLv3. Since Misskey also publishes , you can create a personal application through the code. The translation uses .
Timeline
Misskey’s development was started in 2014.
On April 8, 2018, it began using the ActivityPub protocol to communicate between different servers, and had the codename "nighthike".
On April 14, 2019, version 11 was released. PostgreSQL was adopted as the database software, and the release renamed its codename "daybreak".
On February 6, 2020, version 12 was released with the codename "indigo".
On January 16, 2023, version 13 was released. It’s codename is "nasubi". It added different functions and changed the design drastically.
Technology
The code is written with TypeScript and Node.js. is used as a database software while is used as the Web client since February, 2018. Misskey users can interact with users on any other server that supports .
Differences from Mastodon
Misskey and Mastodon are both distributed social networks based on ActivityPub.
But their programming languages and library are different and their APIs are not compatible.
When it began, Misskey was not designed as |
https://en.wikipedia.org/wiki/Coin%20slab | Coin slab is a type of holder for a coin. Slabbed coins are typically from one of the coin grading companies. The practice of sending coins to third-party grading companies and then "slabbing" them began in 1986.
When a grading company grades the coin it is sealed in a tamper proof slab with a barcode and a hologram. To prevent counterfeiting, holograms were attached to the graded coin slabs beginning in 1989. The early coin slabs did not have a hologram.
History
Slabbing coins is a practice which began in 1986. It was a way to remove coin grading controversies by having a third party certify the coin's condition. There are major coin certification companies that encapsulate coins in an acrylic case after grading the coin. Companies like ANACS, Numismatic Guaranty Company (NGC), Professional Coin Grading Service (PCGS), International Coin Certification Service and CAC accept coins which they grade, certify and then slab. Collectors rely on these third party grading companies to certify coins. After the coins are reviewed and certified a holographic label is attached to the slab. The earliest coins that were slabbed by the major coin grading companies did not have holograms. PCGS began adding a hologram to the reverse of their holders in 1989. NGC began adding a hologram to their coin slabs in 1990.
Counterfeit slabs
Counterfeiters have duplicated some slabs from major grading companies, and in 2023 CoinWeek reported Counterfeit 1881-CC Morgans “PCGS” slabs. In 2018 Coin World numismatic magazine reported that counterfeit PCGS slabs complete with Holograms were being sold on the website AliExpress. They reported that the real slabs are "sonically sealed" but fake slabs snap together. The magazine also reported the discovery of a fake South African gold Krugerrand which was in a Counterfeit NGC slab with a hologram.
References
Coin collecting
Computer storage systems |
https://en.wikipedia.org/wiki/Fascine%20mattress | A fascine mattress , literally sink piece), is a large woven mat made of brushwood, typically willow twigs and shoots, used to protect riverbeds and other underwater surfaces from scour and erosion. They are similar in construction to a fascine, but are primarily used for hydraulic engineering works, typically to strengthen the banks of rivers and streams, as well as coastal structures like revetments and groynes.
Modern fascine mattresses utilise a layer of geotextile in order to fulfill the competing requirements of water permeability balanced with the need to be impervious to sand. Prior to the advent of synthetic geotextiles in the 1960s, a layer formed from reeds was incorporated to make the fascine mattress sand-tight.
Fascine mattresses have been used worldwide, but are particularly common in The Netherlands, where significant expertise in their preparation and construction is available, and where the materials required for their construction are harvested in specially created plantations.
Historical background
have been used in The Netherlands for river and coastal engineering works since at least the 16th century, and were discussed extensively by Andries Vierlingh in his (English: Treatise on dike building), the manuscript of which was not published until 1920, and is now housed in the Nationaal Archief.
The materials for fascine mattresses in The Netherlands were traditionally harvested in osier beds along rivers such as The Merwede, particularly around the Biesbosch, where the materials were grown and coppiced in order to produce the mattresses. The towns of Werkendam and Sliedrecht are notable as centres of fabrication and construction expertise.
In the 16th century, dike workers in The Netherlands were often impoverished, taking on jobs under a day-rate contract. Dike building works were usually tendered in the month of March and often had to be completed by August, and fascine mattresses were a common feature of the work.
In the mid to lat |
https://en.wikipedia.org/wiki/DAPNET | DAPNET (Decentralised Amateur Paging Network) is a free global paging network created and maintained by amateur radio enthusiasts. Messages can be received on commercially available pagers that support the POCSAG protocol and tuned to the appropriate frequency.
History
The project was originally called FunkrufMaster and was created in Germany by the initiative of the staff of the RWTH Aachen University. In 2016, the name was changed to Funkrufmaster 2.0 and then to DAPNET. As of March 2018, over 90 transmitters were already in permanent operation, and the coverage area included parts of Germany, the Netherlands, Belgium, and Switzerland.
Technical specifications
The recommended frequency for DAPNET is 439.9875 MHz, which is 12.5 kHz below the upper limit of the 70-cm amateur radio band. The transmitters are networked, some via HAMNET, some via the Internet. The standard paging protocol POCSAG is used for message transmission. For a low-power transmitter you can use Raspberry Pi with unipager and MMDVM-modem installed, and to make the coverage area several miles, you need to add a radioamplifier to its output. The coverage area of the transmitter can be up to 12 miles (20 km), depending on the terrain and the height of the antenna.
Skyper and Alphapoc pagers are particularly popular for receiving messages. They can be easily tuned to the desired reception frequency and also offer many other possibilities, such as receiving bulletins - messages sent to all recipients. However, other brands of pagers can be customized accordingly or Flipper Zero can be used.
Messages can be sent via a multilingual website as well as Android and iOS apps.
References
External links
hampager.de
Radio paging
Digital amateur radio |
https://en.wikipedia.org/wiki/The%20New%20Voice%20of%20Ukraine | The New Voice of Ukraine or simply as the New Voice is a Ukrainian, English and Russian language newspaper based in Ukraine that was founded in 2014 to offer unbiased and unaffiliated independent reporting on issues regarding Ukraine.
History
The newspaper was founded in 2014 with the mission of not being affiliated to any political party nor be owned by any major corporation. According to data gathered in 2021 by Gemius international research the company had 5,572,440 "real users" visit their site, making them the 5th most viewed news company in Ukraine, additionally their site pulled 10,000,000+ unique visitors according to Google analytics that year. The company also has 14,000 paying subscribers who can see their limited number of articles with a paywall.
Since the start of the Russian invasion of Ukraine, The New Voice of Ukraine has been reporting on the war 24/7 non-stop both on their website, and with their radio station, and, according to The Groundtruth Project is a reliable source that disseminates propaganda to report facts, instead of adding to misinformation. During the Battle of Kyiv, New Voice journalists preformed front-line reporting. Additionally, due to their war coverage, the newspaper was subjected to Russian cyberattacks.
References
Newspapers established in 2014
Ukrainian news websites |
https://en.wikipedia.org/wiki/Exception%20handling%20%28programming%29 | In computer programming, several language mechanisms exist for exception handling. The term exception is typically used to denote a data structure storing information about an exceptional condition. One mechanism to transfer control, or raise an exception, is known as a throw; the exception is said to be thrown. Execution is transferred to a catch.
Programming languages differ substantially in their notion of what an exception is. Contemporary languages can roughly be divided into two groups:
Languages where exceptions are designed to be used as flow control structures: Ada, Modula-3, ML, OCaml, PL/I, Python, and Ruby fall in this category. For example, Python's iterators throw StopIteration exceptions to signal that there are no further items produced by the iterator.
Languages where exceptions are only used to handle abnormal, unpredictable, erroneous situations: C++, Java, C#, Common Lisp, Eiffel, and Modula-2.
History
Software exception handling developed in the 1960s and 1970s. LISP 1.5 (1958-1961) allowed exceptions to be raised by the ERROR pseudo-function, similarly to errors raised by the interpreter or compiler. Exceptions were caught by the ERRORSET keyword, which returned NIL in case of an error, instead of terminating the program or entering the debugger.
PL/I introduced its own form of exception handling circa 1964, allowing interrupts to be handled with ON units.
MacLisp observed that ERRSET and ERR were used not only for error raising, but for non-local control flow, and thus added two new keywords, CATCH and THROW (June 1972). The cleanup behavior now generally called "finally" was introduced in NIL (New Implementation of LISP) in the mid- to late-1970s as UNWIND-PROTECT. This was then adopted by Common Lisp. Contemporary with this was dynamic-wind in Scheme, which handled exceptions in closures. The first papers on structured exception handling were and . Exception handling was subsequently widely adopted by many programming languages from th |
https://en.wikipedia.org/wiki/Bull%20Gamma%203 | The Gamma 3 was an early electronic vacuum-tube computer. It was designed by Compagnie des Machines Bull in Paris, France and released in 1952.
Originally designed as an electronic accelerator for electromechanical tabulating machines, similar to the IBM 604, it was gradually enhanced with new features and evolved into a first-generation stored program computer (Gamma AET, 1955, then ET, 1957). In its stored-program configurations, the Gamma 3 mostly competed with the IBM 650.
Over the course of its ten-year availability, this machine facilitated the transition from electromechanical unit records equipment to computers. The Gamma 3 was a commercial success, eventually selling more than 1200 units and prompting IBM to release the 1401 as a competitor.
The Gamma 3 was succeeded by the lower-end Gamma 10, the mid-range Gamma 30, and the large, high-end Gamma 60 mainframe.
History
Until the 1950s, Compagnie des Machines Bull, like its rival IBM, primarily marketed punched card tabulators for inventory management, payroll, and accounting.
These tabulators performed arithmetic operations through a series of digit wheels driven by an electro-mechanical device. Only incrementation, and thus addition, was supported, making subtractions and multiplications particularly slow.
In order to increase the calculation speed and avoid delaying the reading of punched cards during more complex operations, an accelerator capable of overcoming electro-mechanical limitations became a necessity.
Starting in 1949, the Bull Company became interested in vacuum tubes for their switching speed compared to adding wheels and electromechanical relays. The computer was designed using logical circuits comprising around 400 vacuum tubes, 8000 germanium diodes and 48-bit registers made of electric delay lines to further reduce the dependency on vacuum tubes.
The machine has a clock speed of 281 kHz, higher than the 50 kHz of the IBM 604, and more importantly, several orders of magnitude faste |
https://en.wikipedia.org/wiki/John%20Clark%20%28inventor%29 | John Clark (1785-1853) was a British printer and inventor who created the first automated text generator, the Latin Verse Machine (also known as the Eureka) between 1830 and 1843. Clark also patented a method for rubberising cloth that was used for air beds.
Life
John Clark was born on 21 November 1785 and died on 23 May 1853. He was a cousin of Cyrus and James Clark, who founded the shoe manufacturing company C. & J. Clark, still doing business as Clark. He was a Quaker.
Air beds
In 1813 Clark registered a patent for air-tight beds, pillows and cushions. In an article for the Furniture History Society, Edward Joy wrote that this was the first such patent, and that Clark used "unvulcanized rubber filled by means of an air pump." Clark's patent describes various uses for the new technique, including for beds, which would not require stuffing materials other than air. The air pump could be kept beneath the bed. For medical uses, the bed could also be filled with hot steam or cold water, allowing for a variety of temperatures. Clark also described how printers could use the air pillow to His niece wrote that he sold the patent to Charles Macintosh who used it for his raincoats, although this may have been a misunderstanding on his niece's part.
Although a physician used Clark's invention to make a water bed for invalids, there was no widespread adoption of air beds or water beds at this time, largely due to more complicated maintenance than the more common stuffed beds, and because spring beds became popular.
Latin Verse Machine
Between 1830 and 1843 Clark constructed a machine that could generate a new line of Latin hexameter verse every minute. He exhibited the machine at the Egyptian Hall in Piccadilly, London, during the spring of 1845.
The Latin Verse Machine is the first automated text generator, and a pioneering work of generative art and generative literature. It is a remarkable precursor of the genre of electronic literature, although it is of course m |
https://en.wikipedia.org/wiki/Netsafe | Netsafe is an online safety non-profit organisation in New Zealand. It provides educational, anti-bullying and support services. It was founded in 1998, then known as the Internet Safety Group.
The organisation is contracted under the Harmful Digital Communications Act until 2026. It receives $3.87m public funding each year, of which $812,000 is from the Ministry of Education.
History
Netsafe was founded in 1998 by a group of individuals and organisations concerned at the impact that the internet may have on young people, as the Internet Safety Group. It was rebranded to Netsafe in 2008.
In 2017, Netsafe created a back-and-forth email chatbot, called Re:scam, which asks scammers never-ending questions with the intention of wasting the time of scammers, and ultimately reduce their number of victims. It simulates grammatical errors and humour to make it more believable.
On 29 July 2021 Netsafe had a meeting with executives from Facebook, Twitter and TikTok in efforts to design a code of practice for online safety. It was anticipated that the draft be completed by Christmas of the same year. In May 2022 Brent Carey became CEO of Netsafe.
In 2023, Netsafe's Youth Action Squad created a toolkit providing information about educating people about issues involving sextortion, cyberbullying, privacy, pornography, and problematic gaming behaviours. In late July 2023, Netsafe launched its campaign on sextortion which is a worsening global issue affecting young people and adults.
Employment cases
In March 2022, Netsafe was ordered to pay $100,000 in damages to three women for a privacy breach involving a stalker. That year, a second case involving alleged bullying was settled confidentially.
Harmful Digital Communications Act
The New Zealand Police appointed Netsafe as the approved agency for the Harmful Digital Communications Act. In this position, the agency receives and accesses complaints about harmful communications, investigates complaints, attempts to resolve c |
https://en.wikipedia.org/wiki/Pal-Kal | Pal-Kal () was a construction method for concrete ceilings, invented by engineer Eli Ron in the late 1970s (Israel Patent No. 104,101).
The Pal-Kal method offered an easier, faster, and cheaper solution for casting ceilings compared to traditional reinforced concrete slabs. However, certain applications of this method were proven to be extremely dangerous, and the use of non-standard Pal-Kal ceilings was the main cause of the collapse of the Versailles wedding hall disaster.
Construction method
The basic principle of the Pal-Kal method involved using galvanized steel boxes inside the concrete, replacing the steel rods intended for reinforcement against bending and the upper reinforcement rods. The shape of the concrete poured between the steel boxes was similar to that obtained in a regular ribbed ceiling. In some Pal-Kal ceilings, there was also a thin layer of concrete underneath. The galvanized boxes were placed with the opening facing downwards and with spaces between them. The concrete was poured between and above the boxes. The boxes created air spaces within the ceiling while providing sufficient static thickness. The galvanized steel acted as formwork and also served as reinforcement against bending. In some non-standard Pal-Kal ceilings, the boxes replaced the reinforcement stirrups designed to prevent shearing.
Various versions of the Pal-Kal construction were developed over time, with different combinations of galvanized boxes and different concrete sections, with or without additional steel reinforcement:
Pal-Kal ceiling in a T-section with standard reinforcement stirrups and horizontal reinforcement in its bottom thin layer of concrete.
Pal-Kal ceiling in an I-section with standard reinforcement stirrups.
Pal-Kal ceiling in an I-section without reinforcement stirrups.
Pal-Kal ceiling in an I-section with non-compliant reinforcement stirrups.
Versions 1 and 2 included reinforcement stirrups that provided shear resistance, and such ceilings were |
https://en.wikipedia.org/wiki/Human%20climate%20niche | The human climate niche is the ensemble of climate conditions that have sustained human life and human activities, like agriculture, on the globe for the last millennia. The human climate niche is estimated by calculating the human population density with respect to mean annual temperature. The human population distribution as a function of mean annual temperature is bimodal and results in two modes; one at 15 °C and another one at ~20 to 25 °C. Crops and livestock required for sustaining the human population are also limited to the similar niche conditions. Given the rise in mean global temperatures, the human population is projected to experience climate conditions beyond the human climate niche. Some projections show that considering temperature and demographic changes, 2.0 and 3.7 billion people will live in out of the niche by 2030 and 2090, respectively.
References
Human biology
Human ecology
Climate change adaptation |
https://en.wikipedia.org/wiki/Isbell%27s%20zigzag%20theorem | Isbell's zigzag theorem, a theorem of abstract algebra characterizing the notion of a dominion, was introduced by American mathematician John R. Isbell in 1966. Dominion is a concept in semigroup theory, within the study of the properties of epimorphisms. For example, let is a subsemigroup of containing , the inclusion map is an epimorphism if and only if , furthermore, a map is an epimorphism if and only if . The categories of rings and semigroups are examples of categories with non-surjective epimorphism, and the Zig-zag theorem gives necessary and sufficient conditions for determining whether or not a given morphism is epi. Proofs of this theorem are topological in nature, beginning with for semigroups, and continuing by , completing Isbell's original proof. The pure algebraic proofs were given by and .
Statement
Zig-zag
Zig-zag: If is a submonoid of a monoid (or a subsemigroup of a semigroup) , then a system of equalities;
in which and , is called a zig-zag of length in over with value . By the spine of the zig-zag we mean the ordered -tuple .
Dominion
Dominion: Let is a submonoid of a monoid (or a subsemigroup of a semigroup) . The dominion is the set of all elements such that, for all homomorphisms coinciding on , .
We call a subsemigroup of a semigroup closed
if , and dense if .
Isbell's zigzag theorem
Isbell's zigzag theorem:
If is a submonoid of a monoid then if and only if either or there exists a zig-zag in over with value that is, there is a sequence of factorizations of of the form
This statement also holds for semigroups.
For monoids, this theorem can be written more concisely:
Let be a monoid, let be a submonoid of , and let . Then if and only if in the tensor product .
Application
Let be a commutative subsemigroup of a semigroup . Then is commutative.
Every epimorphism from a finite commutative semigroup to another semigroup is surjective.
Inverse semigroups are absolutely closed.
Example of non-sur |
https://en.wikipedia.org/wiki/Trail%20difficulty%20rating%20system | A trail difficulty rating system, also known as walking track grading system, walk gradings or trail grades, is a classification system for trails or walking paths based on their relative technical and physical difficulty. A trail difficulty rating system informs visitors about the attributes of walking tracks and helps visitors, particularly those who are not usual bushwalkers, make decisions to walk on trails that suit their skill level, manage their risk, improve their experience and assist in the planning of trails and trail systems.
The grading system features a recognizable criteria for visitors, so they can tell the difficulty of a certain walk, thereby allowing the walkers to determine whether they have the physical ability to attempt the walk. The width, length and surface of the trail are important factors to determine the grading, in addition to natural obstacles such as rocks, ridges, holes, logs and drop-offs. The grading system is based on the physical attributes that are present during the course and the challenges, rather than the effort and fitness that is necessary by the walker. Trail length is not a standard of the system. Rather, trail distance should be posted on signs in addition to the difficulty symbol.
Gradings
Australia
Australia's trail rating system evaluates a path's difficulty level based on various criteria, such as: experience needed, steps, slopes, path quality and signage. The system features five grades, which are usually displayed at national parks or state parks:
Grade 1 (Easy/Disabled Access) – "No bushwalking experience required. Flat even surface with no steps or steep sections."
Grade 2 (Easy) – "No bushwalking experience required. The track is hardened or compacted surface and may have a gentle hill section or sections and occasional steps."
Grade 3 (Moderate) – "Suitable for most ages and fitness levels. Some bushwalking experience recommended."
Grade 4 (Moderate-Difficult) – "Bushwalking experience recommended. Tr |
https://en.wikipedia.org/wiki/Knapsack%20auction | A knapsack auction is an auction in which several identical items are sold, and there are several bidders with different valuations interested in different amounts of items. The goal is to choose a subset of the bidders with a total demand, at most, the number of items and, subject to that, a maximum total value. Finding this set of bidders requires solving an instance of the knapsack problem, which explains the term "knapsack auction".
An example application of a knapsack auction is auctioning broadcast time among advertisers. Here, the items are the time units (e.g., seconds). Each advertiser has an adversitement of a different length (different number of seconds) and a different value for an advertisement. The goal is to select a subset of advertisements to serve in a time slot of a specific length to maximize the total value.
Notation
There are m identical items and n different bidders. The preferences of each bidder i are given by two numbers:
A demand si - an integer that determines how many items this bidder wants. The bidder needs precisely this number of items and has no use for more or fewer items.
A value vi - a number that determines how much money the bidder expects to gain from receiving exactly si items.
A feasible outcome of the auction is a subset W of winning bidders, such that their total demand is at most m: . The value of a set W of winners is the sum of values of the winners: . The goal is to find a feasible set of winners with a maximum total value.
In the broadcast time example, if there are 5 minutes allocated for advertisements, then m=300 (the number of seconds), n=the number of potential advertisers, si=the length of i's advertisement in seconds, and vi=the money that i expects to gain if his advertisement is broadcast.
Baseline solutions
If the demands and values of all bidders are publicly known, then the problem can be solved by any algorithm for the knapsack problem. The problem is NP-hard, but it has efficient constant-facto |
https://en.wikipedia.org/wiki/Power%20%28company%29 | Power (formerly Expert) is a Nordic company that sells consumer electronics through subsidiaries. The company headquarters are located in Lørenskog, Norway and operates approx. 269 stores in total across Norway, Sweden, Denmark and Finland. The company belongs to the Power International AS group, which is registered in Norway.
References
Electronics companies established in 1971
Electronics companies
Norwegian companies established in 1971 |
https://en.wikipedia.org/wiki/Conformal%20linear%20transformation | A is a linear transformation that is also a conformal map. Since it is a linear transformation, it transforms vectors between vector spaces. In terms of high-level transform decomposition, a conformal linear transformation may only be composed of rotation and uniform scale (and translation in the case of matrices with an origin vector), but not shear/skew or non-uniform scale. This restriction ensures the transform preserves angles like a conformal map. Additionally, this union of linear transformations and conformal maps has a new property not generally present in either alone, that distance ratios are preserved by the transformation.
General properties
Across all dimensions, a conformal linear transformation matrix has the following properties:
The basis matrix must have the same number of rows and columns, such that its inputs and outputs are in the same dimensions.
Each column vector must be 90 degrees apart from all other column vectors (they are orthogonal).
Angles are preserved by applying the transformation (possibly with orientation reversed).
Distance ratios are preserved by applying the transformation.
Orthogonal inputs remain orthogonal after applying the transformation.
The transformation may be composed of translation.
The basis may be composed of rotation.
The basis may be composed of a flip/reflection.
The basis may be composed of uniform scale.
The basis must not be composed of non-uniform scale.
The basis must not be composed of shear/skew.
The basis must not be composed of squeeze.
The basis must not be composed of projection.
Two dimensions
In 2D, a conformal linear transformation has a special form. For a non-flipped conformal 2D basis, it looks like this:
Or, in the case of a flip/reflection, the form is similar but with the signs swapped in the second column:
This form occurs because in order for a transformation matrix to be conformal, the second column must be 90 degrees apart from the first column (orthogonal), and th |
https://en.wikipedia.org/wiki/Nickelodeon%20All-Star%20Brawl%202 | Nickelodeon All-Star Brawl 2 is an upcoming crossover fighting game developed by Ludosity and Fair Play Labs, and published by GameMill Entertainment. It is the sequel to Nickelodeon All-Star Brawl (2021) and an entry in the Nickelodeon Super Brawl series. The game is scheduled for release on November 7, 2023 for Nintendo Switch, PlayStation 4, PlayStation 5, Windows, Xbox One, and Xbox Series X/S.
Gameplay
Like the previous game, Nickelodeon All-Star Brawl 2 is a 2D platform fighter featuring characters from various Nickelodeon franchises. Gameplay has been updated from the previous entry, with all characters' movesets having been revised and given new horizontal attacks, and new mechanics being added such as aerial dodging and dodge rolling. During gameplay, a new "Slime Meter" can be built up by attacking opponents and used in different ways, such as powering up special attacks, performing attack cancels, and activating powerful character-specific "Super" abilities.
A new single-player campaign has been added, in which players must stop Danny Phantom villain Vlad Plasmius from conquering the multiverse. Players progress through nodes that each feature different challenges and special rules, including boss battles and character-specific nodes. The campaign features roguelike mechanics, with players unlocking new characters and equippable power-ups that can carry over to subsequent runs.
The game also features a refined arcade mode, along with new mini-games and modes such as a boss rush. Certain stages have been updated to feature selectable alternate layouts. In addition, support for cross-platform play has been added to the game's online multiplayer.
Playable characters
The game features 25 playable characters drawn from 17 Nickelodeon franchises, including 14 characters returning from the previous game. Four additional characters are planned to be released as post-launch downloadable content throughout 2024. New characters are marked below in bold.
Develop |
https://en.wikipedia.org/wiki/Insecam | Insecam is a directory website that has lists of unsecured different live IP surveillance CCTV cameras without a changed default password. It had around 73,000 listed cameras .
References
External links
Websites
Web directories
Webcams |
https://en.wikipedia.org/wiki/WELL%20Building%20Standard | WELL Building Standard (WELL) is a healthy building certification program, developed by the non-profit WELL Building Institute (IWBI).
History
The WELL Building Standard began in 2013 by Paul Scialla of Delos company, becoming the first well-being standard focused, administed by the International WELL Building Institute (IWBI). Green Business Certification Inc. from LEED certification is a third-party certified WELL. By the 2016, over 200 projects in 21 countries adopted the certification.
Certification
There are two types of certifications, the WELL Certification and the WELL Core Certification.
The WELL Core is for the building that provide tenant occupation more than 75%, and not needed to achieve minimum points from every subjects.
The WELL Silver, Gold, and Platinum level must achieve at least one, two, and three points per subject, but the WELL Bronze has no minimum points' rule.
The optimization point requirement from the WELL Bronze, Silver, Gold, and Platinum are ranging from 40, 50, 60, and 80 points. The rating system limits 12 points per subject. Total points must not be over 100.
Assessment
The WELL certificated buildings must pass all precondition requirements and they could get optimization points available from extension subjects.
Precondition subjects
Air
WELL conducts to limit level of particulate matter both PM2.5 and PM10, and thresholds for volatile organic compound such as benzene, formaldehyde, toluene. Inorganic gases such as carbon monoxide and ozone are also included. Some threholds are separated into kitchen space and industrial area. Radon mitigation shall be incorporated in project. WELL makes sure that all air quality shall be monitored with a digital platform, except for radon parameter.
Smoking and using of electronic cigarette indoor is not allowed, except for outdoors at only ground level further than 7.5 m from project apertures including air-intake.
WELL assured building to have existing or new mechanical ventilation syst |
https://en.wikipedia.org/wiki/Internal%20carotid%20venous%20plexus | The internal carotid venous plexus is a network of veins surrounding the internal carotid artery as it passes through the carotid canal. The plexus interconnects the internal jugular vein (extracranially) and cavernous sinus (intracranially).
References
Anatomy |
https://en.wikipedia.org/wiki/EXtreme%20Gammon | eXtreme Gammon is backgammon software written by Xavier Dufaure de Citres and released in 2009. It is available for Microsoft Windows and mobile platforms.
According to the Financial Times, the program is the best backgammon player in the world, and the near-exclusive study tool for all serious backgammon players. It rates matches according to the number of mistakes committed by players, providing a widely accepted benchmark for players' skills.
References
External links
Backgammon
Game artificial intelligence |
https://en.wikipedia.org/wiki/Generative%20literature | Generative literature is poetry or fiction that is automatically generated, often using computers. It is a genre of electronic literature, and also related to generative art.
John Clark's Latin Verse Machine (1830-1843) is probably the first example of mechanised generative literature, while Christopher Strachey's love letter generator (1952) is the first digital example. With the large language models (LLMs) of the 2020s, generative literature is becoming increasingly common.
Definitions
Hannes Bajohr defines generative literature as literature involving "the automatic production of text according to predetermined parameters, usually following a combinatory, sometimes aleatory logic, and it emphasizes the production rather than the reception of the work (unlike, say, hypertext)."
In his book Electronic Literature Scott Rettberg connects generative literature to avant-garde literary movements like Dada, Surrealism, Oulipo and Fluxus. Bajohr argues that conceptual art is also an important reference.
Paradigms of generative literature
Bajohr describes two main paradigms of generative literature: the sequential paradigm, where the text generation is "executed as a sequence of rule-steps" and employs linear algorithms, and the connectionist paradigm, which is based on neural nets. The latter leads to what Bajohr calls a algorithmic empathy: "a non-anthropocentric empathy aimed not at the psychological states of the artists but at understanding the process of the work’s material production."
Poetry generation
The first examples of automated generative literature are poetry: John Clark's mechanical Latin Verse Machine (1830-1843) produced lines of hexameter verse in Latin, and Christopher Strachey's love letter generator (1952), programmed on the Manchester Mark 1 computer, generated short, satirical love letters.
Examples of generative poetry using artificial neural networks include David Jhave Johnston's ReRites.
Narrative generation
Story generators have |
https://en.wikipedia.org/wiki/UP%20Diliman%20Department%20of%20Chemical%20Engineering | The Department of Chemical Engineering (DChE) is an academic department operating under the College of Engineering of the University of the Philippines Diliman.
The department was established in 1956 and has an overall 90% passing rate in the licensure examinations held in the Philippines. It also contributes about 10% to 60% of the total number of new chemical engineers in the Philippines every year.
Course offerings
The department offers undergraduate and graduate programs leading to the degree of chemical engineering.
Bachelor of Science in Chemical Engineering (BS ChE) — five-year program leading to the understanding of transport processes, chemical engineering thermodynamics and their applications to unit operations design, thermodynamics and reaction kinetics.
Master of Science in Chemical Engineering (MS ChE) — 24-unit coursework that includes core and elective courses related to chemical engineering and six units of master's thesis.
Doctor of Philosophy in Chemical Engineering (PhD ChE)
Research laboratories
The department consists of thirteen (13) research laboratories in different fields of chemical engineering and allied fields, and also hosts the Chemical Engineering Analytical Laboratory (CEAL), which offers analytical services to the university and industry.
CEAL houses a Scanning Electron Microscope (SEM), a Fourier-Transform Infrared (FTIR) Spectroscope, a Universal Testing Machine (UTM); gas chromatographs (FID, TCD, MS), Ion Chromatographs, and high-performance liquid chromatograph (HPLC); the Department also has a Kjeldahl apparatus, a Karl Fischer apparatus, and an atomic absorption spectrophotometer (AAS). There is a real-time PCR, and digital gradient electrophoresis, shaking incubators and refrigerated incubators for biological studies.
The thirteen (13) research laboratories are the following:
Advanced Materials and Organic Synthesis Laboratory
Bioprocess Engineering Laboratory
Catalysis Research Laboratory
Chemical Engineerin |
https://en.wikipedia.org/wiki/Acoustic%20circulator | In acoustical engineering, an acoustic circulator is a non-reciprocal three-port device that couples airborne sound waves only to an adjacent port in the direction of circulation.
Compared to radio frequency (RF) and microwave circulators, acoustic circulators are for airborne sound waves rather than for RF and microwave electromagnetic signals.
In 2014, Fleury et al. reported and experimentally demonstrated an acoustic Y-circulator by exploiting the acoustic analogue of the Zeeman effect: the structure is composed of a ring cavity with a circulating fluid that facilitates the nonreciprocal transmission of sound waves between acoustic waveguides. Similar circulator designs based on temporal modulation of the effective acoustic index and natural convection were later reported.
References
Audio engineering |
https://en.wikipedia.org/wiki/Perfect%20ideal | In commutative algebra, a perfect ideal is a proper ideal in a Noetherian ring such that its grade equals the projective dimension of the associated quotient ring.
A perfect ideal is unmixed.
For a regular local ring a prime ideal is perfect if and only if is Cohen-Macaulay.
The notion of perfect ideal was introduced in 1913 by Francis Sowerby Macaulay in connection to what nowadays is called a Cohen-Macaulay ring, but for which Macaulay did not have a name for yet. As Eisenbud and Gray point out, Macaulay's original definition of perfect ideal coincides with the modern definition when is a homogeneous ideal in polynomial ring, but may differ otherwise. Macaulay used Hilbert functions to define his version of perfect ideals.
References
Ideals (ring theory)
Commutative algebra |
https://en.wikipedia.org/wiki/Grade%20%28ring%20theory%29 | In commutative and homological algebra, the grade of a finitely generated module over a Noetherian ring is a cohomological invariant defined by vanishing of Ext-modules
For an ideal the grade is defined via the quotient ring viewed as a module over
The grade is used to define perfect ideals. In general we have the inequality
where the projective dimension is another cohomological invariant.
The grade is tightly related to the depth, since
References
Ring theory
Homological algebra
Commutative algebra |
https://en.wikipedia.org/wiki/List%20of%20repunit%20primes | This is a list of repunit primes.
Base 2 repunit primes
Base-2 repunit primes are called Mersenne primes.
Base 3 repunit primes
The first few base-3 repunit primes are
13, 1093, 797161, 3754733257489862401973357979128773, 6957596529882152968992225251835887181478451547013 ,
corresponding to of
3, 7, 13, 71, 103, 541, 1091, 1367, 1627, 4177, 9011, 9551, 36913, 43063, 49681, 57917, 483611, 877843, 2215303, 2704981, 3598867, ... .
Base 4 repunit primes
The only base-4 repunit prime is 5 (). , and 3 always divides when n is odd and when n is even. For n greater than 2, both and are greater than 3, so removing the factor of 3 still leaves two factors greater than 1. Therefore, the number cannot be prime.
Base 5 repunit primes
The first few base-5 repunit primes are
31, 19531, 12207031, 305175781, 177635683940025046467781066894531, 14693679385278593849609206715278070972733319459651094018859396328480215743184089660644531, 35032461608120426773093239582247903282006548546912894293926707097244777067146515037165954709053039550781, 815663058499815565838786763657068444462645532258620818469829556933715405574685778402862015856733535201783524826169013977050781 ,
corresponding to of
3, 7, 11, 13, 47, 127, 149, 181, 619, 929, 3407, 10949, 13241, 13873, 16519, 201359, 396413, 1888279, 3300593, ... .
Base 6 repunit primes
The first few base-6 repunit primes are
7, 43, 55987, 7369130657357778596659, 3546245297457217493590449191748546458005595187661976371, 133733063818254349335501779590081460423013416258060407531857720755181857441961908284738707408499507 ,
corresponding to of
2, 3, 7, 29, 71, 127, 271, 509, 1049, 6389, 6883, 10613, 19889, 79987, 608099, 1365019, 3360347, ... .
Base 7 repunit primes
The first few base-7 repunit primes are
2801, 16148168401, 85053461164796801949539541639542805770666392330682673302530819774105141531698707146930307290253537320447270457,1385022127101034087007743810331355039266633249933176317292277906573251633103418332277759454260526 |
https://en.wikipedia.org/wiki/NCR/32 | The NCR/32 VLSI Processor family was a 32-bit microprocessor architecture and chipset developed by NCR Corporation in the early 1980s. Generally used in minicomputer systems, it was noteworthy for being externally microprogrammable.
History
NCR announced the release of its NCR/32 architecture, comprising an initial four-chip set, in the third quarter of 1982. The Central Processor Chip included an external microcode bus that let a designer create custom instructions for specific applications.
This feature was used to develop microcode that allowed the NCR/32 to emulate NCR's earlier mainframe computers, or an IBM System/370.
The design also enabled high-level languages, such as Prolog and polyFORTH, to be executed directly from custom instructions in the external microcontrol store.
Both the NCR/32 processor and some products that used it have been called reduced instruction set computer (RISC) systems, although the description has been debated. The NCR/32 has also been described as a bit-slice architecture.
NCR used the processor architecture in certain models of their own computer systems, communications peripherals, and at least one board-level product.
Some of the designers of the NCR/32 left NCR for a new company, Celerity Computing, which used the NCR/32 in its own minicomputer designs, running a version of the University of California at Berkeley's Unix Release 4.2.
Chipset
The chipset for the NCR/32 family includes the following devices:
NCR/32-000 Central Processor Chip (CPC)
NCR/32-010 Address Translation Chip (ATC)
NCR/32-020 Extended Arithmetic Chip (EAC)
NCR/32-500 System Interface Controller (SIC)
NCR/32-580 System Interface Transmitter (SIT)
NCR/32-590 System Interface Receiver (SIR)
Features
The NCR/32-000 CPC was the cornerstone of the architecture; all of the other devices were optional. The CPC consists of 40,000 transistors, and was originally fabricated in a 3 micron NMOS process. The device supports two levels of microcode: verti |
https://en.wikipedia.org/wiki/Jelly%20Drops | Jelly Drops is a British confectionary company based in London, England. It produces sugar-free sweets that are made of 95% water and contain electrolytes, natural flavourings and non-artificial colours. It was founded on 28 August 2018, by Lewis Hornby who was inspired by his grandmother Pat, who had dementia and was hospitalized for dehydration.
The company uses a patented method to manufacture sugar-free gummy candy which is 95% water. The confectionary is designed to increase hydration in people who are susceptible to becoming dehydrated, originally being conceived for the elderly, including those with dementia.
Jelly Drops are vegan, recyclable and available to buy online in the UK and the US.
History
Jelly Drops were invented in 2018 by Lewis Hornby, a 24-year-old Royal College of Art student, when his grandmother almost died of dehydration. He spent a month in her nursing home and realised that while many people with dementia refused to drink, did not feel thirst or failed to recognise cups, they would still eat confectionery. He therefore invented a fruity candy made up of 95 per cent water and electrolytes.
When a video of Hornby and his grandmother was shared on Facebook it received over 48 million views, with one viewer setting up a JustGiving page, which raised more than £9,000, in order to help bring the product to market.
In 2019, Jelly Drops received a further £100,000 grant, along with access to a network of industry experts, from the Alzheimer's Society as part of their Accelerator Programme, designed to support products intending to improve care and lifestyle quality of those living with dementia. In return for the charity's investment, Jelly Drops will donate 1% of its profits to help fund further Alzheimer's research.
Jelly Drops launched to the public in the United Kingdom in 2020, and in the United States in 2022. The confectionary is also reportedly used in healthcare settings including in NHS wards.
Awards and accolades
Pitch@Palac |
https://en.wikipedia.org/wiki/Lead%20apatite | Lead apatite is a generic name for apatite-structure materials that contain lead as the divalent cation. A Copper-doped lead-apatite has been proposed as a room-temperature superconductor. A number of minerals are known. All have a hexagonal crystal structure.
Minerals
References
Lead compounds
Crystals in space group 176
Calcium minerals
Gemstones
Halide minerals
Hexagonal minerals
Minerals in space group 176
Phosphate minerals
Piezoelectric materials |
https://en.wikipedia.org/wiki/Orders%20of%20magnitude%20%28torque%29 | The following are examples of orders of magnitude for torque.
Examples
References
Orders of magnitude
Torque |
https://en.wikipedia.org/wiki/Equinox%20Systems | Equinox Systems, Inc., was an American manufacturer of computer networking hardware and developer of networking software based in Miami, Florida, and active from 1983 to 2000. The company started out selling a well-regarded series of enterprise digital PBX systems for data transmissions in the early 1980s, before becoming a major vendor and OEM of modems, Ethernet network switches, and advanced serial communication cards in the 1990s. Equinox was eventually acquired by Avocent of Huntsville, Alabama, in 2000, who kept the company around as a subsidiary for several years.
History
Foundation (1983–1985)
Equinox Systems was founded in Miami-Dade County, Florida, in 1983 by Bill Dambrackas, Mark Cole, and Kevin Doren. Dambrackas and Cole had previously worked for Racal-Milgo, a manufacturer of modems and other telecommunications equipment that had offices in South Miami-Dade. Racal-Milgo announced their intent to move 40 miles north to Broward County in 1982, to the chagrin of Dambrackas and Cole, who did not want to relocate their families in order to keep their jobs. In early 1983, they obtained $1.1 million in financial backing from TA Associates, a Boston-based investment firm, and in March 1983, they formally incorporated Equinox Systems, named so after the March equinox ongoing at the time of the company's foundation. The company was soon joined by eight other former employees of Racal-Milgo who also wanted to avoid moving northward, and by November 1983, Equinox had ten employees on its payroll.
Equinox's first product, a data PBX, was released to market in early 1984, retailing for US$30,000. Data PBXes were a form of private branch exchange developed in the 1970s, which facilitated communications between data terminals and minicomputers and between personal computers and certain peripherals such as modems and printers. Data PBXes were once common in non-IBM shops, but they were prone to collisions and became antiquated in the early 1980s amid rapid developm |
https://en.wikipedia.org/wiki/Volyn%20biota | The Volyn biota are fossilized microorganisms found in rock samples from miarolitic cavities of igneous rocks collected in Zhytomyr Oblast, Ukraine. It is within the historical region of Volyn, hence the name of the find. Exceptionally well-preserved, they were dated to 1.5 Ga, within the "Boring Billion" period of the Proterozoic geological eon.
History of the discovery
The samples of Volyn biota were found in samples from miarolitic pegmatites ("chamber pegmatites") collected from the of the Ukrainian Shield. They were described as early as in 1987, but interpreted as abiogenic formations. In 2000, these formations were reinterpreted as the fossilized cyanobacteria from geyser-type deposits. Until very recently the origin of the Korosten pegmatites was not fully understood, but they were dated to 1.8-1.7 Ga.
Franz et al. (2022, 2023), investigating newly recovered samples they date to 1.5 Ga, described the morphology and the internal structure of Volyn biota and reported the presence of different types of filaments, of varying diameters, shapes and branching in the studied organisms, and provided evidence of the presence of fungi-like organisms and Precambrian continental deep biosphere. Some fossils give evidence of sessility, while others of free-living lifestyle.
Usually Precambrian fossils are not well preserved, but the Volyn biota had exceptional conditions for fossilization in cavities with silicon tetrafluoride-rich fluids. The cavities also preserved them from further diagenetic-metamorphic overprint.
Volyn biota is an additional support of the claim that filamentous fossils dated to 2.4 Ga from the Ongeluk Formation (Griqualand West, South Africa) were also fungi-like organisms.
References
Fossils of Ukraine
Ecosystems
Biological systems
Zhytomyr Oblast
Volhynia
Proterozoic
Lithophiles |
https://en.wikipedia.org/wiki/Brooktrout%20Technology | Brooktrout Technology, Inc., later Brooktrout, Inc., was an American telecommunications company based in Boston, Massachusetts, and active from 1984 to 2005. The company was initially focused on the development of hardware and software to allow personal computers to act as fax machines, similar to GammaLink's GammaFax. The company later developed fax server hardware for local area networks before ultimately pursuing Voice over IP and videoconferencing products. In 2005, the company was acquired by EAS Group, who merged Brooktrout with another company of theirs to form Cantata Technology. Cantata was in turn acquired by Dialogic Group in 2007.
Foundation (1984–1987)
Brooktrout Technology was founded in 1984 in the Greater Boston area by David Duehren, Eric Giler, and Patrick Hynes, former employees of Teradyne, a maker of automatic test equipment also based in Massachusetts. All three were electrical engineers with experience in digital signal processing, gained both in university and on the job while working at Teradyne. Brooktrout struggled to gain venture capital for the first three years of their existence, owing to the founders' youth and what Giles deemed incredulity at the concept of "talk[ing] to machines". Thus, the company was initially headquartered out of Hynes' sixteenth-floor apartment in Boston. Giler, having the most pedigreed business education, was named president, while Duehren was named vice president of research and development, Hynes was named vice president of engineering. Hynes, an avid fisherman who was said to get his best ideas while fishing for trout, came up with Brooktrout's name.
While Brooktrout had been eyeing the integration of fax capability in personal computers since its foundation, the company soft-launched with a family of expansion cards allowing PCs to receive voicemail and send phone messages. In 1985, they launched their first fax-related product, Fax-Mail, which allowed PCs to send and receive fax documents through connec |
https://en.wikipedia.org/wiki/Microtubular%20membrane | A microtubular membrane is a type of membrane made up of small tubular structures. Microtubular associated membranes are found in various cell types and are essential for maintaining cell structure and function. Synthetic membranes are used in chemical separation processes and in flow batteries.
Biology
Cytoskeletal proteins interact with lipid bilayer membranes via interaction with peripheral or integral membrane proteins or through specific domains of cytoskeletal proteins with the lipid bilayer. A characteristic feature of protozoan parasites is an ordered layer of microtubules beneath the cell membrane.
The interaction between microtubules and the plasma membrane provide support, shape, and stability to the cell, as well as act as tracks for transporting materials within the cell. Overall, microtubular membranes are vital components of cellular organization and function. Animal cells (and some filamentous fungi are thought to rely upon the microtubule cytoskeleton and associated motor proteins. Although plants, algae and fungi transport depends on myosins, which move along the actin cytoskeleton, certain organelles can move along microtubules in plant cells.
Applications
Flow battery
Sub-millimeter, bundled microtubular (SBMT) membrane mitigate membrane pressure, which allows ions to pass through without additional support infrastructure This reduces the cost and size of the battery. A demonstration cells displayed higher peak charge and discharge power densities of 1,322 W/Lcell and 306.1 W/Lcell, respectively, compared with <60 W/Lcell and 45 W/Lcell, for conventional (planar) flow cells. SBMT's reduced the inter=membrane distance by ~100-fold and eliminated bulky flow distributors. The battery architecture is compatible with multiple chemistries, including zinc- oxide, zinc–bromide, quinone–bromide, and vanadium.
See also
Nanotube membrane
References
Rechargeable batteries
Cell biology |
https://en.wikipedia.org/wiki/Proximal%20Origin | The Proximal Origin is a reference to a scientific correspondence titled "The proximal origin of SARS-CoV-2" and the events of scientific and political controversies arising from it. The article, published in the journal Nature Medicine on 17 March 2020, was written by a group of virologists including Kristian G. Andersen, Andrew Rambaut, W. Ian Lipkin, Edward C. Holmes and Robert F. Garry. The authors concluded that their genomic analyses "clearly show that SARS-CoV-2 is not a laboratory construct or a purposefully manipulated virus." Three years after the publication, in 2023, the US Republicans raised an allegation that the scientific paper was a coverup to suppress the COVID-19 lab leak theory.
The private deliberations of the authors (during the writing of the paper) accidentally became public and became a topic of discussion and debate.
References
2023 controversies
COVID-19
Scientific and technical responses to the COVID-19 pandemic
Biology controversies |
https://en.wikipedia.org/wiki/Fortnite%20Holocaust%20Museum | The Fortnite Holocaust Museum, also known as Voices of the Forgotten, is a virtual museum for the video game Fortnite Creative, designed by Luc Bernard and approved by publisher Epic Games. It became available in August 2023.
Content
The museum features photographs and plaques highlighting people who resisted the Nazis, and show visitors examples of Nazi atrocities such as the Kristallnacht. One room in the museum features a "Hall of Historical Figures" featuring people such as Marianne Cohn and Abdol Hossein Sardari.
On August 3, 2023, The Jewish Chronicle uploaded a trailer for the Fortnite Holocaust Museum, showcasing the displays and the first person & single player perspective of the exhibit. Designer Luc Bernard cited his fears of the misuse of AI as being a driving force behind his attempts to build a virtual Holocaust exhibit.
Response
Fortnite publisher Epic Games approved the project in August 2023. Some critics of the museum have highlighted issues with Fortnites virtual Martin Luther King Jr. Museum in 2021, where Epic Games disabled emotes following players recording themselves dancing to King's "I Have a Dream" speech. In response to concerns about vandalism of the memorial, Bernard said that many of the game's features would be disabled, arguing that this would make the Fortnite Holocaust Museum better protected than real world monuments.
The Christian Science Monitor commented on the choice of Fortnite as a venue for a Holocaust Museum:"Fortnite is not an obvious location for a museum about genocide; the popular battle royal game is probably known best for its extensive suite of goofy, gesticulating characters. It’s a place where you can find Batman duking it out with a sentient banana peel, and then swinging his arms in a viral victory dance known as the griddy."
Release
The release of the Fortnite Holocaust Museum was delayed following concerns of vandalism by Neo-Nazi internet trolls, particularly after comments from American Holocaust den |
https://en.wikipedia.org/wiki/Mathematics%20for%20social%20justice | Mathematics for social justice is a pedagogical approach to mathematics education that seeks to incorporate lessons from critical mathematics pedagogy and similar educational philosophies into the teaching of mathematics at schools and colleges. The approach tries to empower students on their way to developing a positive mathematics identity and becoming active, numerically literate citizens who can navigate and participate in society. Mathematics for social justice puts particular emphasis on overcoming social inequalities. Its proponents, for example, Bob Moses, may understand numerical literacy as a civil right. Many of the founders of the movement, e.g. Eric Gutstein, were initially mathematics teachers, but the movement has since expanded to include the teaching of mathematics at colleges and universities. Their educational approach is influenced by earlier critical pedagogy advocates such as Paulo Freire and others. Mathematics for social justice has been criticised, however, its proponents argue that it both fits into existing teaching frameworks and promotes students' success in mathematics.
Mathematics for social justice often overlaps with other approaches to mathematics education, the practice and research of mathematics, including ethics in mathematics and ethnomathematics. Common to these approaches is that they can be understood as a sociopolitical turn in mathematics.
Criticism
Pedagogical approaches incorporating issues of social justice into mathematics classrooms have been heavily criticised by some mathematicians and educators. They argue that mathematics is neutral and that its education and research should be separated from issues of social justice. Balancing the requirements of a mathematical education that teaches students mathematical skills and social justice can be difficult. Some of its opponents use this to argue against mathematics for social justice because it would necessarily come at the expense of teaching mathematical knowledge.
|
https://en.wikipedia.org/wiki/Lexicon%20of%20Canadian%20Geologic%20Units | The Lexicon of Canadian Geologic Units, also called the Lexicon of Canadian Geological Names or simply the Lexicon, is an online database provided by the Government of Canada. It includes the names of more than 16,000 geologic units throughout Canada, as well as information about each geologic unit from several sources. The names of these geologic units may be formal, informal or undefined; they may also be obsolete or currently in use.
The Lexicon of Canadian Geologic Units includes both lithological units and chronological units, the latter of which may be searched only by age or name. In addition to age and name, geologic units in the Lexicon may also be searched by first citation, by source data set or by
province or territory.
References
Geology of Canada
Online databases
Government databases in Canada |
https://en.wikipedia.org/wiki/SmartFIX40 | SmartFIX40 was a major transportation improvement project coordinated by the Tennessee Department of Transportation (TDOT) along Interstate 40 (I-40) in downtown Knoxville, Tennessee. The project, referred to as the most ambitious TDOT project at the time, consisted of two separate phases and contracts, started construction in 2005 and was completed in June 2009 at a cost of $190 million. The second phase of the project required the closure of 1.5 miles of I-40 in downtown for a 14-month period, rerouting traffic onto the Interstate 640 (I-640) northern bypass of downtown. At the time of its completion, SmartFIX40 was the largest awarded contract and construction project in Tennessee history, and in retrospective documentation has received acclaim for its methods of accelerated construction and project delivery, including nationwide awards from the American Association of State Highway and Transportation Officials (AASHTO).
Background
The current freeway system in Knoxville originated from a 1945 plan commissioned by the city that recommended a series of controlled-access highways be constructed to relieve congestion on surface streets. Planners intended these routes to be integrated into the then-planned nationwide freeway network that became the Interstate Highway System. This plan included three major arteries out of the city; and east–west route known as the West Expressway and East Expressway, and a north–south route known as the North–South Expressway. These three routes would come together at a junction near downtown. A northern beltway known as the Dutch Valley Loop would bypass downtown to the north. The plan was expanded in 1951 to include a square-shaped freeway loop around downtown known as the Downtown Loop. The northern leg of this loop included the East–West Expressway, which became known as the Magnolia Avenue Expressway at this time, and was the first freeway in Tennessee.
With the passage of the Federal-Aid Highway Act of 1956 most of the free |
https://en.wikipedia.org/wiki/Smoldyn | Smoldyn is an open-source software application for cell-scale biochemical simulations. It uses particle-based simulation, meaning that it simulates each molecule of interest individually, in order to capture natural stochasticity and yield nanometer-scale spatial resolution. Simulated molecules diffuse, react, are confined by surfaces, and bind to membranes in similar manners as in real biochemical systems.
History
Smoldyn was initially released in 2003 as a simulator that represented chemical reactions between diffusing particles in rectilinear volumes. Further development added support for surfaces, multiscale simulation molecules with excluded volume, rule-based modeling and C/C++ and Python APIs. Smoldyn development has been funded by a postdoctoral NSF grant awarded to Steve Andrews, a US DOE contract awarded to Adam Arkin, a grant from the Computational Research Laboratories (Pune, India) awarded to Upinder Bhalla, a MITRE contract and several NIH grants awarded to Roger Brent, and a Simons Foundation grant awarded to Steve Andrews.
Development team
Smoldyn has been developed primarily by Steve Andrews, over the course of multiple research and teaching positions. Other contributors have included Nathan Addy, Martin Robinson, and Diliwar Singh.
Features
Smoldyn is primarily a tool for biophysics and systems biology research. It focuses on spatial scales that are between nanometers and microns. The following features descriptions are drawn from the Smoldyn documentation.
Model definition: Models are entered as text files that describe the system. This includes: lists of molecule species, their diffusion coefficients, and their chemical reactions; lists of surfaces and their interactions with molecules; initial molecule and surface locations; and actions that a "virtual experimenter" carries out during the simulation.
Real-time graphics: Smoldyn displays the simulated system to a graphics window as the simulation runs.
Simulated behaviors: Smoldyn's si |
https://en.wikipedia.org/wiki/Chain%20reactions%20in%20living%20organisms | Chain reaction in chemistry and physics is a process that produces products capable of initiating subsequent processes of a similar nature. It is a self-sustaining sequence in which the resulting products continue to propagate further reactions. There are at least two examples of chain reactions in living organisms.
Lipid peroxidation in cell membranes
Nonenzymatic peroxidation occurs through the action of reactive oxygen species (ROS), specifically hydroxyl (HO•) and hydroperoxyl (HO) radicals, which initiate the oxidation of polyunsaturated fatty acids. Other initiators of lipid peroxidation include ozone (O3), nitrogen oxide (NO), nitrogen dioxide (NO2), and sulfur dioxide. The process of nonenzymatic peroxidation can be divided into three phases: initiation, propagation, and termination. During the initiation phase, fatty acid radicals are generated, which can propagate peroxidation to other molecules. This occurs when a free radical removes a hydrogen atom from a fatty acid, resulting in a lipid radical (L•) with an unpaired electron. In the propagation phase, the lipid radical reacts with oxygen (O2) or a transition metal, forming a peroxyl radical (LOO•). This peroxyl radical continues the chain reaction by reacting with a new unsaturated fatty acid, producing a new lipid radical (L•) and lipid hydroperoxide (LOOH). These primary products can further decompose into secondary products. The termination phase involves the interaction of a radical with an antioxidant molecule, such as α-tocopherol (vitamin E), which inhibits the propagation of chain reactions, thus terminating peroxidation. Another method of termination is the reaction between a lipid radical and a lipid peroxide, or the combination of two lipid peroxide molecules, resulting in stable nonreactive molecules.
Propagation of excitation of neurons in epilepsy
Epilepsy is a neurological condition marked by recurring seizures. It occurs when the brain's electrical activity becomes unbalanced, leading |
https://en.wikipedia.org/wiki/Colorado%20Memory%20Systems | Colorado Memory Systems, Inc. (CMS), was an American technology company independently active from 1985 to 1992 and based in Loveland, Colorado. The company primarily manufactured tape drive systems, especially those using quarter-inch cartridges (QIC)s, for personal computers and workstations. Colorado Memory Systems was founded by Bill Beierwaltes as an offshoot of his previous company, Colorado Time Systems, also based in Loveland. It was acquired by Hewlett-Packard in 1992.
History
Colorado Memory Systems, Inc., was founded by William "Bill" Beierwaltes in Loveland, Colorado, in 1985, as a division of Colorado Time Systems, another Loveland-based company that he had previously founded in 1972. Whereas Colorado Time Systems focused on computerized timekeeping displays for athletics while also selling a broad range of other products, Beierwaltes founded Colorado Memory Systems chiefly to focus on data storage products for the burgeoning personal computer industry of the 1980s. Before founding Colorado Time Systems in 1972, Beierwaltes was a product manager for Hewlett-Packard from 1964 to 1974, working on the development and marketing for HP's electronic measuring equipment, especially their line of voltmeters.
In March 1985, CMS launched its first products, a line of 60-MB quarter-inch cartridge (QIC) drives manufactured by Rexon's WangTek division and rebadged as Tecmar products for redistribution by IBM. The drives made use of the then-ubiquitous QIC-24 tapes and came in three configurations: an external drive sporting only the QIC tape mechanism (QIC/60AT), another external drive comprising the QIC reader–writer and a 20-MB hard disk drive (QIC/60W20), and an internal drive and controller board (QIC/60H). These drives were the first tape backup products to be resold by IBM for their Personal Computer platform (by then also including the XT and AT). In August 1985, CMS collaborated again with Tecmar to release a bevy of peripherals for Commodore's new Amiga c |
https://en.wikipedia.org/wiki/Conley%27s%20fundamental%20theorem%20of%20dynamical%20systems | Conley's fundamental theorem of dynamical systems or Conley's decomposition theorem states that every flow of a dynamical system with compact phase portrait admits a decomposition into a chain-recurrent part and a gradient-like flow part. Due to the concise yet complete description of many dynamical systems, Conley's theorem is also known as the fundamental theorem of dynamical systems. Conley's fundamental theorem has been extended to systems with non-compact phase portraits and also to hybrid dynamical systems.
Complete Lyapunov functions
Conley's decomposition is characterized by a function known as complete Lyapunov function. Unlike traditional Lyapunov functions that are used to assert the stability of an equilibrium point (or a fixed point) and can be defined only on the basin of attraction of the corresponding attractor, complete Lyapunov functions must be defined on the whole phase-portrait.
In the particular case of an autonomous differential equation defined on a compact set X, a complete Lyapunov function V from X to R is a real-valued function on X satisfying:
V is non-increasing along all solutions of the differential equation, and
V is constant on the isolated invariant sets.
Conley's theorem states that a continuous complete Lyapunov function exists for any differential equation on a compact metric space. Similar result hold for discrete-time dynamical systems.
See also
Conley index theory
References
Dynamical systems
Differential topology
Topological dynamics |
https://en.wikipedia.org/wiki/Force%20control | Force control is the control of the force with which a machine or the manipulator of a robot acts on an object or its environment. By controlling the contact force, damage to the machine as well as to the objects to be processed and injuries when handling people can be prevented. In manufacturing tasks, it can compensate for errors and reduce wear by maintaining a uniform contact force. Force control achieves more consistent results than position control, which is also used in machine control. Force control can be used as an alternative to the usual motion control, but is usually used in a complementary way, in the form of hybrid control concepts. The acting force for control is usually measured via force transducers or estimated via the motor current.
Force control has been the subject of research for almost three decades and is increasingly opening up further areas of application thanks to advances in sensor and actuator technology and new control concepts. Force control is particularly suitable for contact tasks that serve to mechanically process workpieces, but it is also used in telemedicine, service robot and the scanning of surfaces.
For force measurement, force sensors exist that can measure forces and torques in all three spatial directions. Alternatively, the forces can also be estimated without sensors, e.g. on the basis of the motor currents. Indirect force control by modeling the robot as a mechanical resistance (impedance) and direct force control in parallel or hybrid concepts are used as control concepts. Adaptive approaches, fuzzy controllers and machine learning for force control are currently the subject of research.
General
Controlling the contact force between a manipulator and its environment is an increasingly important task in the environment of mechanical manufacturing, as well as industrial and service robot. One motivation for the use of force control is safety for man and machine. For various reasons, movements of the robot or machin |
https://en.wikipedia.org/wiki/Kerr%E2%80%93Newman%E2%80%93de%E2%80%93Sitter%20metric | The Kerr–Newman–de–Sitter metric (KNdS) is the one of the most general stationary solutions of the Einstein–Maxwell equations in general relativity that describes the spacetime geometry in the region surrounding an electrically charged, rotating mass embedded in an expanding universe. It generalizes the Kerr–Newman metric by taking into account the cosmological constant .
Boyer–Lindquist coordinates
In signature and in natural units of the KNdS metric is
with all the other , where is the black hole's spin parameter, its electric charge and the cosmological constant with as the time-independent Hubble parameter. The electromagnetic 4-potential is
The frame-dragging angular velocity is
and the local frame-dragging velocity relative to constant positions (the speed of light at the ergosphere)
The escape velocity (the speed of light at the horizons) relative to the local corotating ZAMO (zero angular momentum observer) is
The conserved quantities in the equations of motion
where is the four velocity, is the test particle's specific charge and the Maxwell–Faraday tensor
are the total energy
and the covariant axial angular momentum
The overdot stands for differentiation by the testparticle's proper time or the photon's affine parameter, so .
Null coordinates
To get coordinates we apply the transformation
and get the metric coefficients
and all the other , with the electromagnetic vector potential
Defining ingoing lightlike worldlines give a light cone on a spacetime diagram.
Horizons and ergospheres
The horizons are at and the ergospheres at .
This can be solved numerically or analytically. Like in the Kerr and Kerr–Newman metrics the horizons have constant Boyer-Lindquist , while the ergospheres' radii also depend on the polar angle .
This gives 3 positive solutions each (including the black hole's inner and outer horizons and ergospheres as well as the cosmic ones) and a negative solution for the space at in the antiverse behi |
https://en.wikipedia.org/wiki/Lesion%20network%20mapping | Lesion network mapping is a neuroimaging technique that analyzes the connectivity pattern of brain lesions to identify neuroanatomic correlates of symptoms. The technique was developed by Michael D. Fox and Aaron Boes to understand the network anatomy of lesion induced neurologic and psychiatric symptoms that can not be explained by focal anatomic localization. Lesion network mapping applies a network-based approach to identify connected brain networks, rather than focal brain regions, that correlate with a specific symptom.
In focal neuroanatomic localization, developed by Paul Broca and others, specific symptoms that occur due to brain lesions can be understood by identifying a specific brain region that is injured by lesions to establish brain-symptom relationships. However, a number of neurologic symptoms, such as peduncular hallucinosis, are not amenable to this approach since the lesions associated with the symptom do not map to one focal brain location. Lesion network mapping helps to explain these lesion-induced syndromes by showing that lesion locations associated with a given symptom all map to a shared brain network even if they do not all map to a focal brain region. The technique maps the location of lesions associated with a specific symptom and analyzes the connectivity pattern of the lesions compared to large, standardized human brain atlases. While initially developed using resting-state connectome atlases, the technique has been expanded to include large structural network atlases.
Lesion network mapping has helped map the network anatomy of numerous rare neurologic syndromes (peduncular hallucinosis, delusional misidentification, reduplicative paramensia, akinetic mutism, blindsight, visual anosognosia), common neurologic syndromes (seizures, aphasia, amnesia, parkinsonism), psychiatric syndromes (depression, mania), as well as complex human behaviors (religiosity, consciousness, free will, criminality, addiction). The technique has been success |
https://en.wikipedia.org/wiki/Ammann%20A1%20tilings | In geometry, an Ammann A1 tiling is a tiling from the 6 piece prototile set shown on the right. They were found in 1977 by Robert Ammann. Ammann was inspired by the Robinsion tilings, which were found by Robinson in 1971. The A1 tiles are one of five sets of tiles discovered by Ammann and described in Tilings and Patterns.
The A1 tile set is aperiodic, i.e. they tile the whole Euclidean plane, but only without ever creating a periodic tiling.
Generation through matching
The prototiles are squares with indentations and protrusions on the sides and corners that force the tiling to form a pattern of a perfect binary tree that is continued indefinitely. The markings on the tiles in the pictures emphasize this hierarchical structure, however, they have only illustrative character and do not represent additional matching rules as this is already taken care of by the indentations and protrusions.
However, the tiling produced in this way is not unique, not even up to isometries of the Euclidean group, e.g. translations and rotations. When going to the next generation, one has choices. In the picture to the left, the initial patch in the left upper corner highlighted in blue can be prolonged by either a green or a red tile, which are mirror images of each other and instances of the prototile labeled b. Then there are two more choices in the same spirit but with prototile e. The remainder of the next generation is then fixed. If one would deviate from the pattern for this next generation, one would run into configurations that will not match up globally at least at some later stage.
The choices are encoded by infinite words from for the alphabet , where g indicates the green choice while r indicates the red choice. These are in bijection to a Cantor set and thus their cardinality is the continuum. Not all choices lead to a tiling of the plane. E.g. if one only sticks to the green choice one would only fill a lower right corner of the plane. If there are sufficiently gen |
https://en.wikipedia.org/wiki/App%20%28file%20format%29 | The HarmonyOS App Pack or the App file, identified with the file extension ".app", serves as the file format used by the HarmonyOS operating system. It functions as a native HarmonyOS app for distribution and installation through Huawei AppGallery, or for distribution through Huawei Ability Gallery in respect of installation-free apps.
Each HarmonyOS app contains one or more HarmonyOS Ability Package (HAP) files with the file extension ".hap", and the pack.info file that describes the attributes of the App file.
Most HarmonyOS apps contain at least one HAP file of the entry type, which is the main module of the app, and additional HAP files of the feature type, which is used to implement a specific app feature.
Overview
App Pack and HAP files
HarmonyOS apps are distributed as a software package file known as the App Pack or the App file, suffixed with .app, which is analogous to other software packages such as apk used by the Android operating system, appx in Microsoft Windows, or a Debian package in Debian-based operating systems.
To make a HarmonyOS app, a software development tool such as DevEco Studio is required to code and pack HarmonyOS Ability Package (HAP) and associated files into an app package.
The HAP files may consist of resources, third-party libraries and configuration files. They are classified into two types of modules, i.e., entry and feature. The entry type of the HAP files is the main module and must be included into an app package, while the feature type of the HAP files is additional modules for implementing the features of the apps.
Moreover, an App file that contains different builds and specifications optimized for the various devices may contain more than one HAP file of the entry type.
Prior to packing into an App Pack, HAP files are allowed to run directly on a real device or an emulator for developers to debug and verify the apps during the development phase.
After development, the apps containing signature information can be |
https://en.wikipedia.org/wiki/Kode%20With%20Klossy | Kode with Klossy is a free American coding camp for teenage girls. It was founded by Karlie Kloss in 2015.
History
In 2015, Kloss “spent more than $20,000 to underwrite 21 scholarships for girls aged 13-18 to attend Flatiron’s two-week pre-college coding class. The school matched her donation.” In 2016, Kloss created her own free two-week coding bootcamp for teen girls and non-binary teens, Kode with Klossy.
Kode with Klossy pays for travel costs and computers for any scholars requiring financial assistance. According to Forbes, Kloss “has personally donated seven figures to Kode With Klossy. For additional funding, she has redirected a share of her modeling contracts with companies including Adidas, Swarovski, and Express.” The organization has partnered with Teach for America, Apple, Muslim Girl, Estée Lauder, Ford, Carolina Herrera, Chegg, and Away. In 2018, a cohort of Kode with Klossy students were featured in Kloss's 73 Questions with Vogue interview.
Kode with Klossy teaches the basics of numerous programming languages, such as Ruby, JavaScript, and Swift. By the end of the program, participants in the camp have built fully functional mobile apps or websites.
In the United States, Kode with Klossy has workshops based in New York City, Los Angeles, and St. Louis. During the COVID-19 pandemic, Kode with Klossy has utilized Zoom to include scholars from over a hundred countries in workshops. In 2023, the camp added a workshop in London.
Outcomes
Many scholars use the coding skills they develop at Kode with Klossy to further social justice causes. One alumnus, Sofia Ongele, created an app, ReDawn, to provide resources to survivors of sexual assault. Another alumnus created an app to inform users of safe running routes in their neighborhood. Kode with Klossy scholar, Maya Dummett, “has worked on creating apps to improve social welfare services and created a chatbot called "M" who encourages others to pursue STEM.” KWK scholar, Etasha Donthi, created her own |
https://en.wikipedia.org/wiki/Cheems | Balltze (, 9 January 2011 – 18 August 2023), nicknamed Cheems in online memes, was a famous Shiba Inu from Hong Kong. He was called Ball Ball by his owners.
Biography
Balltze was born on 9 January 2011. He was adopted at the age of one from an emigrating friend, by fashion designer Kathy from Kowloon. Kathy's brother named him after Ramune, a Japanese beverage in which a marble ball inside the bottle is pressed down to let the drink flow. He was known as Ball Ball by his owners.
In May 2022, Balltze was diagnosed with pancreatitis. He recovered in June. In May 2023, his owners reported that he had serious respiratory problems. He had cancer and was undergoing thoracentesis (the draining of fluid from his chest) when he died on 18 August 2023, aged 12. In a 2020 interview with Know Your Meme, Kathy said that Balltze wanted his legacy to be "Meme fade, [fellow Shiba Inu meme] Doge is eternal. Remember me as 'Balltze', not 'Cheems' or 'cheemsburger', I'm just a Balltze".
Memes
Balltze appears as the Internet meme character Cheems, whose name comes from his taste for "cheemsburgers" . The character adds the letter "m" into words as he speaks. The meme was first posted to the r/dogelore subreddit on Reddit in June 2019. The image used for the meme was uploaded originally on Balltze's Instagram account in 2017, and shows him sitting on the floor.
Cheems also features in the "Swole Doge vs Cheems" meme in which a muscular version of Doge represents something considered better in the past, and Cheems represents its current, lesser state. The meme became viral in mid-2020, during the COVID-19 pandemic. In another meme format, Godzilla and King Kong represent two competing concepts, while Cheems armed with a baseball bat is the winning third concept, chasing the other two away.
In 2020, another meme circulated, in which Cheems hits another dog with a baseball bat causing the onomatopoeia "bonk", while saying "go to horny jail"; the meme is posted in response to sexually |
https://en.wikipedia.org/wiki/Aspiration%20window | An aspiration window is a heuristic used in pair with alpha-beta pruning in order to reduce search time for combinatorial games by supplying a window (or range) around an estimated score guess.
Alpha-beta pruning achieves its performance by using cutoffs from its original range. Aspiration windows take advantage of this by supplying a smaller initial window, which increases the amount of cutoffs and therefore efficiency.
However, due to search instability, the score may not always be in the window range. This may lead to a costly re-search that can penalize performance. Despite this, popular engines such as Stockfish still use aspiration windows.
The guess that aspiration windows use is usually supplied by the last iteration of iterative deepening.
See also
Principal variation search
References
Game artificial intelligence |
https://en.wikipedia.org/wiki/Unilever%20Research%20Laboratorium | The Unilever Research Laboratorium was a nutrition and human biology research centre in South Holland, owned by Unilever, and since November 2019, has been a private science park.
History
Construction
At the time of construction in 1956, Vlaardingen was the third-busiest port in the Netherlands, situated on the Nieuwe Maas.
On 14 February 1945, a neighbouring Unilever factory was set up as a V-1 launching site, with another site at Ypenburg, on the coast. The site was consequently attacked by RAF Typhoon aircraft on 23 March 1945. These were some of the last V-1 missiles launched against England.
The neighbouring factory closed in 2008. Research by Unilever in the Netherlands occurred during the war at Zwijndrecht, Netherlands.
Opening
The site was officially opened in November 1956 by Willem Drees, the Dutch prime minister. Another research site was at Bahrenfeld in Germany.
The site presented the Unilever Research Prize for over 60 years when owned by Unilever Benelux.
Current site
On 6 October 2016, Unilever announced that the site would close. The site closed in November 2019 and is now a private science park.
Research
In 1968, it found the protein miraculin, as well as researchers at the Florida State University College of Human Sciences.
Other work made by Henk Van der Wel into the biochemistry of sweetness sensing was published in Chemical Senses.
By genetically changing a bacterium, the genes for making thaumatin were added, in 1980.
Visits
On 1 April 1969, a new laboratory was opened by Prince Claus of the Netherlands.
On 5 December 2016 Martijn van Dam, State Secretary for the Ministry of Economic Affairs and Climate Policy, visited.
Former employees
David Adriaan van Dorp, in 1967 worked with University College Cardiff
See also
Monell Chemical Senses Center
References
1956 establishments in the Netherlands
2019 disestablishments in the Netherlands
Biochemistry research institutes
Buildings and structures in South Holland
Economy of Sou |
https://en.wikipedia.org/wiki/PX5%20RTOS | PX5 RTOS is a real-time operating system (RTOS) designed for embedded systems. It is implemented using the ANSI C programming language.
Overview
The PX5 RTOS, created by William Lamie, is an embedded real-time operating system (RTOS) that was launched in January 2023. Lamie, who also developed other RTOSes such as Nucleus RTX, Nucleus PLUS, and ThreadX (acquired by Microsoft), currently serves as the President and CEO of PX5, an embedded software company headquartered in San Diego, California, United States. Among these RTOSes, approximately 10 billion devices are operated by the ThreadX RTOS, while the Nucleus RTOS is used in around 3 billion devices.
The name PX5 is an abbreviation where P stands for POSIX threads, X stands for thread switching, and 5 represents fifth generation RTOS. Written in ANSI C, the PX5 RTOS is compatible with various embedded microcontroller unit (MCU) and memory protection unit (MPU) architectures. It has minimal resource requirements, needing less than 1KB of FLASH and 1KB of RAM for basic operations on microcontrollers.
One of the notable features of the PX5 RTOS is its native support for POSIX Threads (pthreads), which is an industry-standard API often absent in many other RTOS solutions. Additionally, it offers real-time extensions such as event flags, fast queues, tick timers, and memory management.
The PX5 RTOS executes most API calls and context switches in less than a microsecond on typical 32-bit microcontrollers. It is also deterministic - ensuring predictable processing for each API and context switch regardless of the number of active threads.
The PX5 RTOS incorporates Pointer/Data Verification (PDV) technology, which verifies function return addresses, function pointers, system objects, global data, memory pools, and more.
Supported platforms
PX5 RTOS supports most of the embedded MCU and MPU architectures, including ARM's Cortex-M, Cortex-R, Cortex-A, and RISC-V architecture families. It supports both 32-bit and 64-b |
https://en.wikipedia.org/wiki/Mahjong%20and%20artificial%20intelligence | Mahjong is a relatively complex four-player game with multiple variants played all around the world. When developing a mahjong-related artificial intelligence (AI), there are several factors researchers must consider; an AI must take into account its own hand as well as what it infers about the other players' hands utilizing the information available. Researchers have developed several mahjong-related AI models with various applications.
Shanten and kabe
Researchers noticed that the current AI models that existed purely to calculate the shanten of a hand did not account for the discarded tiles. These researchers developed the Block Deficiency Model, an AI that would calculate the shanten of the hand taking Kabe, tiles that are all used or discarded, into account.
Scoring
Scoring rules
Japanese mahjong has complex scoring rules; in general, the number of points a hand is worth will be calculated from the fu and han of the hand. Han is gained from dora and yaku. Honba must also be considered; each honba adds 300 points to the next winning hand. AI is being developed to do these calculations.
Recognizing the score with AI
Researchers took note of the complexity involved in mahjong's scoring system and attempted to make an AI that could recognize the components of a winning hand and calculate the score with the goal of helping people restrained by their old age. Because this AI model attempted to recognize tiles in real life instead of on a computer, some tiles were misidentified.
Playing mahjong
Single-player mahjong
Researchers decided to make an AI model that played a "simplified", single-player variant of mahjong; this model was intended to provide a framework for other models to use. They considered their model "greedy" because it only focused on winning itself. The researchers later added a second player, but ended the game after one hand; to maximize its expected score, the AI would have to consider the speed and value of the hand it would like to achie |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.